2.4 Given a scenario, recommend controls to mitigate attacks and software vulnerabilities

• Cross-site scripting

  • Reflected
  • Persistent
    • Overflow vulnerabilities
  • Buffer
  • Integer
  • Heap
  • Stack
    • Data poisoning
    • Broken access control
    • Cryptographic failures
    • Injection flaws
    • Cross-site request forgery
    • Directory traversal
    • Insecure design
    • Security misconfiguration
    • End-of-life or outdated
    components
    • Identification and authentication
    failures
    • Server-side request forgery
    • Remote code execution
    • Privilege escalation
    • Local file inclusion (LFI)/remote
    file inclusion (RFI)