Index 5. Web Application Exploitation with Broken Authentication and Path Traversal References (Pauli, 2013)