Results 11 to 20 of about 149,520 (284)

Effective and scalable black-box fuzzing approach for modern web applications

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Web applications’ security is critical because we share sensitive data through them frequently, which attracts attackers who exploit their vulnerabilities.
Aseel Alsaedi   +2 more
doaj   +1 more source

LogInjector: Detecting Web Application Log Injection Vulnerabilities

open access: yesApplied Sciences, 2022
Web applications widely use the logging functionality, but improper handling can bring serious security threats. An attacker can trigger the execution of malicious data by writing malicious data to the web application logs and then accessing the view ...
Zulie Pan   +4 more
doaj   +1 more source

Discovery and research of network security vulnerabilities based on Web application

open access: yes网络与信息安全学报, 2016
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj   +3 more sources

Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities

open access: yesApplied Sciences, 2023
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song   +3 more
doaj   +1 more source

On Race Vulnerabilities in Web Applications [PDF]

open access: yes, 2008
A web programmer often conceives its application as a sequential entity, thus neglecting the parallel nature of the underlying execution environment. In this environment, multiple instances of the same sequential code can be concurrently executed. From such unexpected parallel execution of intended sequential code, some unforeseen interactions could ...
R. Paleari   +3 more
openaire   +3 more sources

A Clustering Approach for Web Vulnerabilities Detection [PDF]

open access: yes2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing, 2011
This paper presents a new algorithm aimed at the vulnerability assessment of web applications following a black-box approach. The objective is to improve the detection efficiency of existing vulnerability scanners and to move a step forward toward the automation of this process. Our approach covers various types of vulnerabilities but this paper mainly
Dessiatnikoff, Anthony   +4 more
openaire   +1 more source

Classification of logical vulnerability based on group attacking method [PDF]

open access: yes, 2020
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal   +2 more
core   +2 more sources

Web Interface Security Vulnerabilities of European Academic Repositories

open access: yesLiber Quarterly: The Journal of European Research Libraries, 2017
The given analysis summarizes the status quo of the level of security of web interfaces of selected European academic repositories in the field of library and information science.
Matus Formanek, Martin Zaborsky
doaj   +1 more source

European Digital Libraries: Web Security Vulnerabilities [PDF]

open access: yes, 2010
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core   +2 more sources

State-Sensitive Black-Box Web Application Scanning for Cross-Site Scripting Vulnerability Detection

open access: yesApplied Sciences, 2023
Black-box web application scanning has been a popular technique to detect Cross-Site Scripting (XSS) vulnerabilities without prior knowledge of the application. However, several limitations lead to low efficiency of current black-box scanners, including (
Tianxiang Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy