Session Fixation
Session fixation vulnerabilities typically arise when an application creates an anonymous session for each user when they first access the
Read moreSession fixation vulnerabilities typically arise when an application creates an anonymous session for each user when they first access the
Read moreJSON hijacking is a special version of an XSRF attack, which in certain circumstances can violate the objectives of the
Read moreFrame injection is a relatively simple vulnerability that arises from the fact that in many browsers, if a web site
Read moreHTTP header injection vulnerabilities arise when user-controllable data is inserted in an unsafe manner into an HTTP header returned by
Read moreThe majority of interesting attacks against web applications involve targeting the server-side application itself. Many of these attacks do of course
Read moreJust as there is no unique signature by which logic flaws in web applications can be identified, there is also
Read moreThe best way to learn about logic flaws is not by theorizing, but through acquaintance with some actual examples. Although
Read moreAll web applications employ logic in order to deliver their functionality. Writing code in a programming language involves at its
Read moreBy far the most effective means of eliminating path traversal vulnerabilities is to avoid passing user-submitted data to any file
Read morePath traversal vulnerabilities are often subtle and hard to detect, and it may be necessary to prioritize your efforts on
Read more