Skip to content

Back

Challenges by vulnerability

Injection

XSS / HTML injection

Auth / access control

Deserialization / gadget chains

Prototype pollution / sandbox escape

Info disclosure / logic