<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="fr">
	<id>https://lea-linux.org/docs/index.php?action=history&amp;feed=atom&amp;title=Checklist_s%C3%A9curit%C3%A9_pentest_applications</id>
	<title>Checklist sécurité pentest applications - Historique des versions</title>
	<link rel="self" type="application/atom+xml" href="https://lea-linux.org/docs/index.php?action=history&amp;feed=atom&amp;title=Checklist_s%C3%A9curit%C3%A9_pentest_applications"/>
	<link rel="alternate" type="text/html" href="https://lea-linux.org/docs/index.php?title=Checklist_s%C3%A9curit%C3%A9_pentest_applications&amp;action=history"/>
	<updated>2026-05-19T14:56:01Z</updated>
	<subtitle>Historique des versions pour cette page sur le wiki</subtitle>
	<generator>MediaWiki 1.40.1</generator>
	<entry>
		<id>https://lea-linux.org/docs/index.php?title=Checklist_s%C3%A9curit%C3%A9_pentest_applications&amp;diff=42807&amp;oldid=prev</id>
		<title>Lea : Page créée avec « = Checklist sécurité et pentest sur des applis =  ( Credits : @Dheerajmadhukar(twitter) )  * [+] Cache Poisoning * [+] Cash Overflow * [+] Clickjacking * [+] Command inj... »</title>
		<link rel="alternate" type="text/html" href="https://lea-linux.org/docs/index.php?title=Checklist_s%C3%A9curit%C3%A9_pentest_applications&amp;diff=42807&amp;oldid=prev"/>
		<updated>2021-09-22T08:00:58Z</updated>

		<summary type="html">&lt;p&gt;Page créée avec « = Checklist sécurité et pentest sur des applis =  ( Credits : @Dheerajmadhukar(twitter) )  * [+] Cache Poisoning * [+] Cash Overflow * [+] Clickjacking * [+] Command inj... »&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nouvelle page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= Checklist sécurité et pentest sur des applis =&lt;br /&gt;
&lt;br /&gt;
( Credits : @Dheerajmadhukar(twitter) )&lt;br /&gt;
&lt;br /&gt;
* [+] Cache Poisoning&lt;br /&gt;
* [+] Cash Overflow&lt;br /&gt;
* [+] Clickjacking&lt;br /&gt;
* [+] Command injection attacks&lt;br /&gt;
* [+] Comment Injection Attack&lt;br /&gt;
* [+] Content Security Policy&lt;br /&gt;
* [+] Content Spoofing&lt;br /&gt;
* [+] Credential stuffing&lt;br /&gt;
* [+] Cross Frame Scripting&lt;br /&gt;
* [+] Cross Site History Manipulation (XSHM)&lt;br /&gt;
* [+] Cross Site Tracing&lt;br /&gt;
* [+] Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* [+] Cross Site Port Attack (XSPA)&lt;br /&gt;
* [+] Cross-Site Scripting (XSS)&lt;br /&gt;
* [+] Cross-User Defacement&lt;br /&gt;
* [+] Custom Special Character Injection&lt;br /&gt;
* [+] Denial of Service&lt;br /&gt;
* [+] Direct Dynamic Code Evaluation (Eval Injection)&lt;br /&gt;
* [+] Execution After Redirect (EAR)&lt;br /&gt;
* [+] Exploitation of CORS&lt;br /&gt;
* [+] Forced browsing&lt;br /&gt;
* [+] Form action hijacking&lt;br /&gt;
* [+] Format string attack&lt;br /&gt;
* [+] Full Path Disclosure&lt;br /&gt;
* [+] Function Injection&lt;br /&gt;
* [+] Host Header injection&lt;br /&gt;
* [+] HTTP Response Splitting&lt;br /&gt;
* [+] HTTP verb tampering&lt;br /&gt;
* [+] HTML injection&lt;br /&gt;
* [+] LDAP injection&lt;br /&gt;
* [+] Log Injection&lt;br /&gt;
* [+] Man-in-the-browser attack&lt;br /&gt;
* [+] Man-in-the-middle attack&lt;br /&gt;
* [+] Mobile code: invoking untrusted mobile code&lt;br /&gt;
* [+] Mobile code: non-final public field&lt;br /&gt;
* [+] Mobile code: object hijack&lt;br /&gt;
* [+] One-Click Attack&lt;br /&gt;
* [+] Parameter Delimiter&lt;br /&gt;
* [+] Page takeover&lt;br /&gt;
* [+] Path Traversal&lt;br /&gt;
* [+] Reflected DOM Injection&lt;br /&gt;
* [+] Regular expression Denial of Service – ReDoS&lt;br /&gt;
* [+] Repudiation Attack&lt;br /&gt;
* [+] Resource Injection&lt;br /&gt;
* [+] Server-Side Includes (SSI) Injection&lt;br /&gt;
* [+] Session fixation&lt;br /&gt;
* [+] Session hijacking attack&lt;br /&gt;
* [+] Session Prediction&lt;br /&gt;
* [+] Setting Manipulation&lt;br /&gt;
* [+] Special Element Injection&lt;br /&gt;
* [+] SMTP injection&lt;br /&gt;
* [+] SQL Injection&lt;br /&gt;
* [+] SSI injection&lt;br /&gt;
* [+] Traffic flood&lt;br /&gt;
* [+] Web Parameter Tampering&lt;br /&gt;
* [+] XPATH Injection&lt;br /&gt;
* [+] XSRF or SSRF&lt;br /&gt;
* [+] Sql Injection Attack&lt;br /&gt;
* [+] Hibernate Query Language Injection&lt;br /&gt;
* [+] Direct OS Code Injection&lt;br /&gt;
* [+] XML Entity Injection&lt;br /&gt;
* [+] Broken Authentication and Session Management&lt;br /&gt;
* [+] Cross-Site Scripting (XSS)&lt;br /&gt;
* [+] Insecure Direct Object References&lt;br /&gt;
* [+] Security Misconfiguration&lt;br /&gt;
* [+] Sensitive Data Exposure&lt;br /&gt;
* [+] Missing Function Level Access Control&lt;br /&gt;
* [+] Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* [+] Using Components with Known Vulnerabilities&lt;br /&gt;
* [+] Unvalidated Redirects and Forwards&lt;br /&gt;
* [+] Cross Site Scripting Attacks&lt;br /&gt;
* [+] Click Jacking Attacks&lt;br /&gt;
* [+] DNS Cache Poisoning&lt;/div&gt;</summary>
		<author><name>Lea</name></author>
	</entry>
</feed>