Vulnerable Web Server Software

Web server products range from extremely simple and lightweight software which does little more than serve up static pages, to

Read more

Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities occur when an application copies user-controllable data into a memory buffer that is not sufficiently large to

Read more

Technical Challenges Faced by Vulnerability Scanners

The barriers to automation described previously lead to a number of specific technical challenges that must be addressed in the

Read more

Session Fixation

Session fixation vulnerabilities typically arise when an application creates an anonymous session for each user when they first access the

Read more

HTTP Header Injection

HTTP header injection vulnerabilities arise when user-controllable data is inserted in an unsafe manner into an HTTP header returned by

Read more