Vulnerable Web Server Software
Web server products range from extremely simple and lightweight software which does little more than serve up static pages, to
Read moreWeb server products range from extremely simple and lightweight software which does little more than serve up static pages, to
Read moreBuffer overflow vulnerabilities occur when an application copies user-controllable data into a memory buffer that is not sufficiently large to
Read moreThe barriers to automation described previously lead to a number of specific technical challenges that must be addressed in the
Read moreThe manual request component of the integrated test suites provides the basic facility to issue a single request and view
Read moreSome attacks on web applications can be performed using only a standard web browser; however, the majority of them require
Read moreActiveX controls are of particular interest to an attacker who is targeting other users. When an application installs a control
Read moreSession fixation vulnerabilities typically arise when an application creates an anonymous session for each user when they first access the
Read moreHTTP header injection vulnerabilities arise when user-controllable data is inserted in an unsafe manner into an HTTP header returned by
Read moreThe best way to learn about logic flaws is not by theorizing, but through acquaintance with some actual examples. Although
Read moreAll web applications employ logic in order to deliver their functionality. Writing code in a programming language involves at its
Read more