News

A Linux-based e-commerce platform is prone to XSS and SQL injection attacks. Step 1: Scanning with OWASP ZAP OWASP ZAP identifies an SQL injection vulnerability in the login page.
Google crawler tricked into performing SQL injection attacks using decade-old technique Let the search engine do the dirty work with carefully crafted links.