💻
Application Security Cheat Sheet
search
Ctrlk
  • Application Security Cheat Sheet
  • Android Application
    • Overviewchevron-right
    • Intent Vulnerabilitieschevron-right
    • WebView Vulnerabilitieschevron-right
  • CI/CD
    • Dependencychevron-right
      • Dependency Confusion
      • Dependency Hijaking
      • Typosquatting
    • GitHubchevron-right
  • Cloud
    • AWSchevron-right
  • Container
    • Overviewchevron-right
    • Escapingchevron-right
    • Container Analysis Tools
  • Framework
    • Springchevron-right
    • Reactchevron-right
  • Linux
    • Overviewchevron-right
    • Bash Tips
  • iOS Application
    • Overviewchevron-right
    • Getting Startedchevron-right
  • Resources
    • Listschevron-right
    • Researchingchevron-right
    • Softwarechevron-right
    • Trainingchevron-right
  • Web Application
    • Abusing HTTP hop-by-hop Request Headers
    • Broken Authenticationchevron-right
    • Command Injectionchevron-right
    • Content Security Policy
    • Cookie Securitychevron-right
    • CORS Misconfiguration
    • File Upload Vulnerabilities
    • GraphQL Vulnerabilities
    • HTML Injectionchevron-right
    • HTTP Header Security
    • HTTP Request Smuggling
    • Improper Rate Limits
    • JavaScript Prototype Pollution
    • JSON Web Token Vulnerabilities
    • OAuth 2.0 Vulnerabilitieschevron-right
    • Race Condition
    • Server Side Request Forgerychevron-right
    • SVG Abuse
    • Weak Random Generation
    • Web Cache Poisoning
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. CI/CD

Dependency

Dependency Confusionchevron-rightDependency Hijakingchevron-rightTyposquattingchevron-right
PreviousWebSettings Vulnerabilitieschevron-leftNextDependency Confusionchevron-right