scholarly journals A Note on Web Vulnerabilities

10.28945/3872 ◽  
2018 ◽  
Vol 3 ◽  
pp. 001-007
Author(s):  
Onochie Fan-Osuala

This note provides a brief description of web application vulnerabilities and preventive measures.

2020 ◽  
Vol 8 (6) ◽  
pp. 5279-5281

CSS is one of the foremost routine vulnerabilities that affect many web applications. XSS attacks are essentially malicious injections (client-side) that are added to an internet page or app through user comments, form submissions, and so on. The most danger behind XSS is that it allows attackers to inject content into the online app. The injected content can modify how it's displayed, forcing the browser to execute the attacker’s code. Web vulnerabilities are developed for scanning whole webpage of internet sites. Vulnerability Assessment is that the process of identifying vulnerabilities in your application’s environment. Vulnerability is defined as a weakness or flaw within the system that permits an attacker or insider to access the system during a way they’re not authorized.


2020 ◽  
Author(s):  
Ouissem Ben Fredj ◽  
omar cheikhrouhou ◽  
Moez Krichen ◽  
Habib Hamam ◽  
Abdelouahid Derhab

Web applications (WAs) are constantly evolving and deployed at broad scale. However, they are exposed to a variety of attacks. The biggest challenge facing organizations is how to develop a WA that fulfills their requirements with respect to sensitive data exchange, E-commerce, and secure workflows. This paper identifies the most critical web vulnerabilities according to OWASP Top Ten, their corresponding attacks, and their countermeasures. The application of these countermeasures will guarantee the protection of the WAs against the most severe attacks and prevent several unknown exploits.


Author(s):  
Loye Lynn Ray

Today's dynamic web-based applications have become a normal and critical asset to an organizations business. They come with an increase in the number of web vulnerabilities and attacks. These weaknesses allow hackers to focus their attention on attacking this important information source. The most common vulnerability is cross-site scripting (XSS) and one of the Open Web Application Security project (OWASP) top ten web-threats. XSS occurs when a Web-based application allows untrusted information be accepted and sent back to a browser. Also they can execute scripts within a browser that can deface web sites, redirect users to malicious content and hijack browsers. One reason for this problem was the lack of developers understanding the causes of XSS. In this paper, the authors address the causes of XSS and countermeasures to defense against these threats.


2020 ◽  
Author(s):  
Ouissem Ben Fredj ◽  
omar cheikhrouhou ◽  
Moez Krichen ◽  
Habib Hamam ◽  
Abdelouahid Derhab

Web applications (WAs) are constantly evolving and deployed at broad scale. However, they are exposed to a variety of attacks. The biggest challenge facing organizations is how to develop a WA that fulfills their requirements with respect to sensitive data exchange, E-commerce, and secure workflows. This paper identifies the most critical web vulnerabilities according to OWASP Top Ten, their corresponding attacks, and their countermeasures. The application of these countermeasures will guarantee the protection of the WAs against the most severe attacks and prevent several unknown exploits.


Author(s):  
Loye Lynn Ray

Today's dynamic web-based applications have become a normal and critical asset to an organizations business. They come with an increase in the number of web vulnerabilities and attacks. These weaknesses allow hackers to focus their attention on attacking this important information source. The most common vulnerability is cross-site scripting (XSS) and one of the Open Web Application Security project (OWASP) top ten web-threats. XSS occurs when a Web-based application allows untrusted information be accepted and sent back to a browser. Also they can execute scripts within a browser that can deface web sites, redirect users to malicious content and hijack browsers. One reason for this problem was the lack of developers understanding the causes of XSS. In this paper, the authors address the causes of XSS and countermeasures to defense against these threats.


2015 ◽  
Vol 21 ◽  
pp. 97
Author(s):  
Nitika Malhotra ◽  
Reem Alnazawi ◽  
Ved Gossain ◽  
Matthew Hebdon
Keyword(s):  

Crisis ◽  
2009 ◽  
Vol 30 (4) ◽  
pp. 180-185 ◽  
Author(s):  
Evertjan Jansen ◽  
Marcel C.A. Buster ◽  
Annemarie L. Zuur ◽  
Cees Das

Background: According to recent figures, Amsterdam is the municipality with the highest absolute number of suicides and the second highest suicide rate in the Netherlands. Aims: The aim of the study was to identify time trends and demographic differences in the occurrence of nonfatal suicide attempts versus suicides. Methods: We used registrations of forensic physicians and ambulance services of the Municipal Health Service of Amsterdam to study 1,004 suicides and 6,166 nonfatal attempts occurring in Amsterdam over the period 1996–2005. Results: The number of nonfatal attempts declined from 1996 to 2005, but the number of completed suicides remained relatively stable. Although case fatality was strongly associated with method used, we also found higher case fatalities for men and older people independent of method. Conclusions: The case fatality results suggest differences in motive among different demographic groups: possibly the wish to die is stronger among men and elderly. This finding had implications for the success to be expected from different preventive measures.


Sign in / Sign up

Export Citation Format

Share Document