Academic Journals Database
Disseminating quality controlled scientific knowledge

A Review of the Vulnerabilities of Web Applications

Author(s): Ravneet Kaur Sidhu

Journal: International Journal of Computer Science and Mobile Computing
ISSN 2320-088X

Volume: 2;
Issue: 9;
Start page: 302;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Misconfiguration | Indexing | Anti-automation | Validation | Expiration | Authentication

Insecure software is undermining our financial, healthcare, defense, energy, andother infrastructure. As our digital infrastructure gets increasingly complex andinterconnected the difficulty of achieving application security increases exponentially. Anattacker can target and compromise a database server in a number of ways by exploiting avariety of configurations and application level vulnerabilities. In this paper we discuss someattacks and weaknesses that can result in the compromise of a web application or its user.
RPA Switzerland

Robotic Process Automation Switzerland


Tango Jona
Tangokurs Rapperswil-Jona