Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 8|回復: 0

This permission error occurs when developers

[複製鏈接]

1

主題

1

帖子

5

積分

新手上路

Rank: 1

積分
5
發表於 2024-3-10 11:30:47 | 顯示全部樓層 |閱讀模式
Even backups need to be encrypted to protect them safely. Do not accept anything from a connection that is not HTTPS. Use HTTPS and PFS Missing function level access control (missing function level access control) This is an error that occurs due to the issue of decentralization .  rely on the fact that the server creates the user interface (UI) and users cannot access functions if they are not authorized from the server. On the other hand, hackers can still make “hidden” functional requests and are not hindered by the user interface. Missing function level access control - one of the website's security holes. Missing function level access control - one of the website's security holes . How to prevent On the server side, always implement decentralization thoroughly, that alone is enough. Cross Site Request Forgery (CSRF).



This is a vulnerability that occurs because a third party impersonates a user and sends Email Data requests to the target website using a browser with the user's session or cookies. This will make the target website still think this is its user. This spoofing attack causes serious consequences for users. This vulnerability will lead to data theft, password changes, etc. Cross Site Request Forgery is one of the most common website security vulnerabilities. Cross Site Request Forgery is one of the most common website security vulnerabilities . How to prevent The way to prevent this vulnerability is to have a separate and secret token in a hidden HTML form field to prove that the request comes from the user's website. Using components with known vulnerabilities Most software today uses external components or libraries because they provide a lot of support to programmers.



Vulnerabilities from components such as libraries, plugins and other components are called component vulnerabilities. Using components with known vulnerabilities is a vulnerability that occurs when the software uses libraries that already have vulnerabilities. How to prevent You need to pay careful attention when using external components, and carefully check the code to see if there are any vulnerabilities. Because when there is a vulnerability, hackers can read your data, passwords, etc. You need to update everything. Make sure you're using the latest version of everything and update regularly. Unvalidated redirects and forwards (Do not check URL redirects and forwards) This vulnerability is caused by an input filtering issue .

回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

Archiver|手機版|自動贊助|z

GMT+8, 2025-4-23 01:25 , Processed in 0.057144 second(s), 18 queries .

抗攻擊 by GameHost X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |