Introduction
In the OWASP Top 10, we usually see the most common way of finding and exploiting vulnerabilities. In this chapter, we will cover some of the uncommon cases one might come across while hunting for bugs in a web application.
In the OWASP Top 10, we usually see the most common way of finding and exploiting vulnerabilities. In this chapter, we will cover some of the uncommon cases one might come across while hunting for bugs in a web application.