Encoding and Canonicalization Vulnerabilities
Encoding flaws have arisen in many kinds of web server software and present an inherent threat in situations where the
Read moreEncoding flaws have arisen in many kinds of web server software and present an inherent threat in situations where the
Read moreAccipiter DirectServer This path traversal flaw could be exploited by placing URL-encoded dot-dot-slash sequences into a request. For more information
Read moreBuffer overflow vulnerabilities occur when an application copies user-controllable data into a memory buffer that is not sufficiently large to
Read moreThe barriers to automation described previously lead to a number of specific technical challenges that must be addressed in the
Read moreThe manual request component of the integrated test suites provides the basic facility to issue a single request and view
Read moreSome attacks on web applications can be performed using only a standard web browser; however, the majority of them require
Read moreSession fixation vulnerabilities typically arise when an application creates an anonymous session for each user when they first access the
Read moreJSON hijacking is a special version of an XSRF attack, which in certain circumstances can violate the objectives of the
Read moreFrame injection is a relatively simple vulnerability that arises from the fact that in many browsers, if a web site
Read moreHTTP header injection vulnerabilities arise when user-controllable data is inserted in an unsafe manner into an HTTP header returned by
Read more