Security

Intro

Basics: Input and Output

SQL Injection

Cross-Site Scripting

Insufficient Authorization

Insecure Uploads/Static Content

Session Hijacking/Prediction

Cross-Site Request Forgery

Insecure Data Storage

Example Security Breaches