Results 1 to 10 of about 149,421 (186)
Preventing SQL Injection through Automatic Query Sanitization with ASSIST [PDF]
Web applications are becoming an essential part of our everyday lives. Many of our activities are dependent on the functionality and security of these applications. As the scale of these applications grows, injection vulnerabilities such as SQL injection
Raymond Mui, Phyllis Frankl
doaj +4 more sources
In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks are performed and focused on the vulnerabilities related to web applications. Hence, nowadays the mitigation of application vulnerabilities is an ignited research
Faris Faisal Fadlalla +1 more
doaj +3 more sources
A Web Second-Order Vulnerabilities Detection Method
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj +3 more sources
Web Vulnerability Study of Online Pharmacy Sites [PDF]
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core +5 more sources
Detection of the Security Vulnerabilities in Web Applications [PDF]
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an
Marius POPA
doaj +2 more sources
Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices [PDF]
Broken access control vulnerabilities pose significant security risks to the protected web interfaces of IoT devices, enabling adversaries to gain unauthorized access to sensitive configurations and even use them as stepping stones for attacking the ...
Enze Wang +8 more
doaj +2 more sources
Comparative evaluation of approaches & tools for effective security testing of Web applications [PDF]
It is generally accepted that adopting both static application security testing (SAST) and dynamic application security testing (DAST) approaches is vital for thorough and effective security testing.
Sana Qadir +3 more
doaj +3 more sources
Approach of Web Application Access Control Vulnerability Detection Based on State Deviation Analysis [PDF]
Attackers can exploit vulnerabilities in Web applications to implement malicious behaviors such as disrupting application functionality and Trojan implantation.For the detection of access control vulnerabilities in Web applications,existing me-thods have
MA Qican, WU Zehui, WANG Yunchao, WANG Xinlei
doaj +1 more source
Remote Penetration Testing with Telegram Bot
The widespread of websites and web applications makes them the main target of cyber attacks. One way to increase security is to perform a penetration test.
Naufal Hafiz +4 more
doaj +1 more source
Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance.
Rokia Lamrani Alaoui, El Habib Nfaoui
doaj +1 more source

