ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review of the Vulnerabilities of Web Applications?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 9)

Publication Date:

Authors : ;

Page : 302-309

Keywords : Misconfiguration; Indexing; Anti-automation; Validation; Expiration; Authentication;

Source : Downloadexternal Find it from : Google Scholarexternal


Insecure software is undermining our financial, healthcare, defense, energy, and other infrastructure. As our digital infrastructure gets increasingly complex and interconnected the difficulty of achieving application security increases exponentially. An attacker can target and compromise a database server in a number of ways by exploiting a variety of configurations and application level vulnerabilities. In this paper we discuss some attacks and weaknesses that can result in the compromise of a web application or its user.

Last modified: 2013-12-03 15:37:05