“…SSC is not as simple as it seems to be, various challenges are faced during this process. Some critical challenges involved in SSC are listed below 38‐50 : - Injection,
- Broken authentication and session management,
- Cross‐site scripting
- Insecure direct object reference,
- Security misconfiguration,
- Sensitive data exposure,
- Missing function level access control,
- Cross‐site request forgery,
- Using components with know vulnerabilities,
- Invalidated redirects and forwards,
- Data validation,
- Authentication,
- Session management,
- Authorization,
- Cryptography,
- Error handling,
- Logging,
- Security configuration,
- Network architecture.
…”