Securing Web Server Software
To some extent, an organization deploying a third-party web server product is inevitably placing its fate in the hands of
Read moreTo some extent, an organization deploying a third-party web server product is inevitably placing its fate in the hands of
Read moreIf you are lucky, the web server you are targeting may contain some of the actual vulnerabilities described in this
Read moreEncoding flaws have arisen in many kinds of web server software and present an inherent threat in situations where the
Read moreThe barriers to automation described previously lead to a number of specific technical challenges that must be addressed in the
Read moreSome attacks on web applications can be performed using only a standard web browser; however, the majority of them require
Read moreMany users access web applications from a shared environment in which an attacker may have direct access to the same
Read moreActiveX controls are of particular interest to an attacker who is targeting other users. When an application installs a control
Read moreJSON hijacking is a special version of an XSRF attack, which in certain circumstances can violate the objectives of the
Read moreHTTP header injection vulnerabilities arise when user-controllable data is inserted in an unsafe manner into an HTTP header returned by
Read moreThe majority of interesting attacks against web applications involve targeting the server-side application itself. Many of these attacks do of course
Read more