Vulnerable Mapping of Tokens to Sessions
Various common vulnerabilities in session management mechanisms arise because of weaknesses in the way the application maps the creation and
Read moreVarious common vulnerabilities in session management mechanisms arise because of weaknesses in the way the application maps the creation and
Read moreNo matter how effective an application is at ensuring that the session tokens it generates do not contain any meaningful
Read moreSome session tokens do not contain any meaningful data associating them with a particular user but are nevertheless guessable because
Read moreImplementing a secure authentication solution involves attempting to simultaneously meet several key security objectives, and in many cases trade off
Read moreActiveX controls are a much more heavyweight technology than Java applets. They are effectively native Win32 executables that, once accepted
Read moreBesides HTML forms, the other main method for capturing, validating, and submitting user data is to use a thick-client component.
Read moreThe other principal way in which applications use client-side controls to restrict data submitted by clients occurs with data that
Read more