Vulnerable Web Server Software
Web server products range from extremely simple and lightweight software which does little more than serve up static pages, to
Read moreWeb server products range from extremely simple and lightweight software which does little more than serve up static pages, to
Read moreThe barriers to automation described previously lead to a number of specific technical challenges that must be addressed in the
Read moreActiveX controls are of particular interest to an attacker who is targeting other users. When an application installs a control
Read moreJSON hijacking is a special version of an XSRF attack, which in certain circumstances can violate the objectives of the
Read moreFrame injection is a relatively simple vulnerability that arises from the fact that in many browsers, if a web site
Read moreHTTP header injection vulnerabilities arise when user-controllable data is inserted in an unsafe manner into an HTTP header returned by
Read moreMany scripting languages support the use of include files. This facility enables developers to place reusable code components into individual
Read moreIn order to extract useful data from the database, you normally need to know the names of the tables and
Read moreMost of the techniques described so far are effective against all of the common database platforms, and any divergences have
Read more