Results 21 to 30 of about 149,520 (284)

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

WEB APPLICATION PROTECTION TECHNOLOGIES

open access: yesСучасні інформаційні системи, 2020
The subject matter of the article is the vulnerabilities that there are in web applications. The goal is to analyze the problem of violation of information security of web applications.
Volodymyr Pevnev   +2 more
doaj   +1 more source

DeepSQLi: Deep Semantic Learning for Testing SQL Injection

open access: yes, 2020
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi   +15 more
core   +1 more source

EWVHunter: Grey-Box Fuzzing with Knowledge Guide on Embedded Web Front-Ends

open access: yesApplied Sciences, 2020
At present, embedded devices have become a part of people’s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are ...
Enze Wang   +5 more
doaj   +1 more source

WAPTT - Web Application Penetration Testing Tool

open access: yesAdvances in Electrical and Computer Engineering, 2014
Web applications vulnerabilities allow attackers to perform malicious actions that range from gaining unauthorized account access to obtaining sensitive data.
DURIC, Z.
doaj   +1 more source

Detection of Web Command Injection Vulnerability for Cisco IOS-XE [PDF]

open access: yesJisuanji kexue, 2023
Cisco’s new operating system,Cisco IOS-XE,is widely deployed on platforms such as Cisco routers and switches.However,there are vulnerabilities in the system’s Web management interface to allow permission escalation through command injection.Network ...
HE Jie, CAI Ruijie, YIN Xiaokang, LU Xuanting, LIU Shengli
doaj   +1 more source

Some security issues for web based frameworks [PDF]

open access: yes, 2010
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core   +1 more source

FirmHunter: State-Aware and Introspection-Driven Grey-Box Fuzzing towards IoT Firmware

open access: yesApplied Sciences, 2021
IoT devices are exponentially increasing in all aspects of our lives. Via the web interfaces of IoT devices, attackers can control IoT devices by exploiting their vulnerabilities.
Qidi Yin, Xu Zhou, Hangwei Zhang
doaj   +1 more source

Possibilities of conducting XSS-attacks and the development of countermeasures [PDF]

open access: yesE3S Web of Conferences, 2020
The article describes the investigation process of the possibilities of XSS–attacks, and the development of counteraction means to these attacks. Researches were determined whether XSS–attack can be fulfilled successfully, and vulnerability detection ...
Revyakina Yelena   +5 more
doaj   +1 more source

Using Flask for SQLIA Detection and Protection

open access: yesTikrit Journal of Engineering Sciences, 2020
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application.
Ann Z. Ablahd, Suhair A. Dawwod
doaj   +3 more sources

Home - About - Disclaimer - Privacy