web vulnerabilities
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 9)

H-INDEX

3
(FIVE YEARS 1)

2020 ◽  
Author(s):  
Ouissem Ben Fredj ◽  
omar cheikhrouhou ◽  
Moez Krichen ◽  
Habib Hamam ◽  
Abdelouahid Derhab

Web applications (WAs) are constantly evolving and deployed at broad scale. However, they are exposed to a variety of attacks. The biggest challenge facing organizations is how to develop a WA that fulfills their requirements with respect to sensitive data exchange, E-commerce, and secure workflows. This paper identifies the most critical web vulnerabilities according to OWASP Top Ten, their corresponding attacks, and their countermeasures. The application of these countermeasures will guarantee the protection of the WAs against the most severe attacks and prevent several unknown exploits.


2020 ◽  
Author(s):  
Ouissem Ben Fredj ◽  
omar cheikhrouhou ◽  
Moez Krichen ◽  
Habib Hamam ◽  
Abdelouahid Derhab

Web applications (WAs) are constantly evolving and deployed at broad scale. However, they are exposed to a variety of attacks. The biggest challenge facing organizations is how to develop a WA that fulfills their requirements with respect to sensitive data exchange, E-commerce, and secure workflows. This paper identifies the most critical web vulnerabilities according to OWASP Top Ten, their corresponding attacks, and their countermeasures. The application of these countermeasures will guarantee the protection of the WAs against the most severe attacks and prevent several unknown exploits.


Author(s):  
Luis F. de Lima ◽  
Matheus C. Horstmann ◽  
David N. Neto ◽  
Andre R. A. Gregio ◽  
Fabiano Silva ◽  
...  

2020 ◽  
Vol 8 (6) ◽  
pp. 5279-5281

CSS is one of the foremost routine vulnerabilities that affect many web applications. XSS attacks are essentially malicious injections (client-side) that are added to an internet page or app through user comments, form submissions, and so on. The most danger behind XSS is that it allows attackers to inject content into the online app. The injected content can modify how it's displayed, forcing the browser to execute the attacker’s code. Web vulnerabilities are developed for scanning whole webpage of internet sites. Vulnerability Assessment is that the process of identifying vulnerabilities in your application’s environment. Vulnerability is defined as a weakness or flaw within the system that permits an attacker or insider to access the system during a way they’re not authorized.


2019 ◽  
Vol 16 (5) ◽  
pp. 1993-2000
Author(s):  
T Aditya Sai Srinivas ◽  
Somula Ramasubbareddy ◽  
K Govinda

Author(s):  
Muhammad Noman Khalid ◽  
Humera Farooq ◽  
Muhammad Iqbal ◽  
Muhammad Talha Alam ◽  
Kamran Rasheed

2019 ◽  
Vol 2019 (1) ◽  
pp. 20 ◽  
Author(s):  
Tom Parsons

10.28945/3872 ◽  
2018 ◽  
Vol 3 ◽  
pp. 001-007
Author(s):  
Onochie Fan-Osuala

This note provides a brief description of web application vulnerabilities and preventive measures.


Sign in / Sign up

Export Citation Format

Share Document