Our Recent Posts

Archive

Tags

No tags yet.

Common Vulnerabilities and Exploits Series - Episode 2 - POST Requests

POST requests without input sanitation can be used to manipulate a web page's HTML.