Results 21 to 30 of about 149,520 (284)
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources
WEB APPLICATION PROTECTION TECHNOLOGIES
The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications.
Volodymyr Pevnev +2 more
doaj +1 more source
DeepSQLi: Deep Semantic Learning for Testing SQL Injection
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi +15 more
core +1 more source
EWVHunter: Grey-Box Fuzzing with Knowledge Guide on Embedded Web Front-Ends
At present, embedded devices have become a part of people’s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are ...
Enze Wang +5 more
doaj +1 more source
WAPTT - Web Application Penetration Testing Tool
Web applications vulnerabilities allow attackers to perform malicious actions that range from gaining unauthorized account access to obtaining sensitive data.
DURIC, Z.
doaj +1 more source
Detection of Web Command Injection Vulnerability for Cisco IOS-XE [PDF]
Cisco’s new operating system,Cisco IOS-XE,is widely deployed on platforms such as Cisco routers and switches.However,there are vulnerabilities in the system’s Web management interface to allow permission escalation through command injection.Network ...
HE Jie, CAI Ruijie, YIN Xiaokang, LU Xuanting, LIU Shengli
doaj +1 more source
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
FirmHunter: State-Aware and Introspection-Driven Grey-Box Fuzzing towards IoT Firmware
IoT devices are exponentially increasing in all aspects of our lives. Via the web interfaces of IoT devices, attackers can control IoT devices by exploiting their vulnerabilities.
Qidi Yin, Xu Zhou, Hangwei Zhang
doaj +1 more source
Possibilities of conducting XSS-attacks and the development of countermeasures [PDF]
The article describes the investigation process of the possibilities of XSS–attacks, and the development of counteraction means to these attacks. Researches were determined whether XSS–attack can be fulfilled successfully, and vulnerability detection ...
Revyakina Yelena +5 more
doaj +1 more source
Using Flask for SQLIA Detection and Protection
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application.
Ann Z. Ablahd, Suhair A. Dawwod
doaj +3 more sources

