Information Exposure Through Error Messages
Security programming and secure coding guide.
OAuth 2.0 is an authorization framework for delegated access.
Cross-Site Scripting (XSS)
Automatic Connection to an Untrusted URL
System Data Information Exposure
Upload of Dangerous File Types
Path Manipulation and Resource Injection
Weak Password Requirements
One-way Hash Functions Without Salt
Use of Weak Cryptographic Algorithms
Missing Limits on Repeated Authentication Attempts
Operating System Command Injection
Improper Resource Release
Kerberos is a ticket-based network authentication protocol.
SAML exchanges authentication and authorization assertions in XML.
Cryptography protects data through hashing and encryption.
JWT is a self-contained token format used to exchange claims between systems.