News

A Linux-based e-commerce platform is prone to XSS and SQL injection attacks. Step 1: Scanning with OWASP ZAP OWASP ZAP identifies an SQL injection vulnerability in the login page.
Unsurprisingly enough, it turns out that Google isn't actually using its Web crawlers to perform SQL injection attacks on other people's sites. Unknown, and presumably malicious, third parties are.