Common Vulnerabilities and Exploits Series - Episode 2 - POST RequestsDec 30, 20191 min readUpdated: Jan 15, 2021POST requests without input sanitation can be used to manipulate a web page's HTML.https://video.wixstatic.com/video/0acdc5_bedb381a04df47108eb9a26f1e5c7b38/1080p/mp4/file.mp4
Comments