ex1.php : Bypass htmlspecialchars in Javascript context.
ex2.php : Bypass addslashes in Javascript context.
ex3.php : Bypass checks for Path Traversal
Attack Vectors:
- Execution After Redirect (EAR)
- Brute Force
- Path Traversal
- CRSF
- Information Disclosure
- Type Confusions
- DOS
- Privilege Escalation
- Session Fixation
- Weak Cryptography
Inejctions:
- HTML Injection (XSS)
- SQL Injection (Blind,Time,Error)
- XPATH Injection
- File Injection (LFI/RFI)
- Template Injection