Results 11 to 20 of about 149,520 (284)
Effective and scalable black-box fuzzing approach for modern web applications
Web applications’ security is critical because we share sensitive data through them frequently, which attracts attackers who exploit their vulnerabilities.
Aseel Alsaedi +2 more
doaj +1 more source
LogInjector: Detecting Web Application Log Injection Vulnerabilities
Web applications widely use the logging functionality, but improper handling can bring serious security threats. An attacker can trigger the execution of malicious data by writing malicious data to the web application logs and then accessing the view ...
Zulie Pan +4 more
doaj +1 more source
Discovery and research of network security vulnerabilities based on Web application
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj +3 more sources
Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song +3 more
doaj +1 more source
On Race Vulnerabilities in Web Applications [PDF]
A web programmer often conceives its application as a sequential entity, thus neglecting the parallel nature of the underlying execution environment. In this environment, multiple instances of the same sequential code can be concurrently executed. From such unexpected parallel execution of intended sequential code, some unforeseen interactions could ...
R. Paleari +3 more
openaire +3 more sources
A Clustering Approach for Web Vulnerabilities Detection [PDF]
This paper presents a new algorithm aimed at the vulnerability assessment of web applications following a black-box approach. The objective is to improve the detection efficiency of existing vulnerability scanners and to move a step forward toward the automation of this process. Our approach covers various types of vulnerabilities but this paper mainly
Dessiatnikoff, Anthony +4 more
openaire +1 more source
Classification of logical vulnerability based on group attacking method [PDF]
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal +2 more
core +2 more sources
Web Interface Security Vulnerabilities of European Academic Repositories
The given analysis summarizes the status quo of the level of security of web interfaces of selected European academic repositories in the field of library and information science.
Matus Formanek, Martin Zaborsky
doaj +1 more source
European Digital Libraries: Web Security Vulnerabilities [PDF]
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core +2 more sources
State-Sensitive Black-Box Web Application Scanning for Cross-Site Scripting Vulnerability Detection
Black-box web application scanning has been a popular technique to detect Cross-Site Scripting (XSS) vulnerabilities without prior knowledge of the application. However, several limitations lead to low efficiency of current black-box scanners, including (
Tianxiang Zhang +4 more
doaj +1 more source

