Vulnerabilities
1.
REHAN Yesterday / 17:50
First, "holes" are slang for vulnerabilities. Second, they vary widely, and in web applications, they can be indirect (SQL Inj, XSS) or indirect. That is, the code itself isn't vulnerable, but it's imperfect (the site doesn't use tokens, there's no SSL), leading to vulnerabilities like CSRF, ClickJecking, and Mitm.
xss - injection of potentially dangerous html/js code for the purpose of stealing cookies or other similar actions
sql inj - injection of dangerous sql code for the purpose of obtaining data or disabling a site
csrf - form substitution
mitm - traffic theft/modification
clickcjecking - performing actions on behalf of another person, similar to csrf but not.
How to protect yourself:
from XSS - escaping, converting HTML entities to a safe form.
The htmlspecialchars function
from sql inj - good typing, or the mysql(i)_real_escape_string functions, or use PDO
from csrf - use CSRF tokens
from mitm - have a good ssl
And finally, carefully set cmod (access rights), be careful also with eval (the function executes the code inside itself), be careful when connecting files, say if you connect a file based on cookies.
URL:
https://pakwap.com/public/index.php/topics/506