Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This report focuses on vulnerabilities on web-applications and web-sites from Cross-Site Scripting attacks (XSS). The different types of XSS attacks are examined: DOM-based, active and passive attacks. The spread of XSS attacks across... more
    • by 
    •   4  
      Computer ScienceComputer SecurityWeb Application SecurityCross Site Scripting
Web application has become an essential part of daily activities to provide easy accessibility that ensures better performance. It is a platform where sensitive information such as username, password, credit card details, operating system... more
    • by  and +1
    •   3  
      Cyber SecurityCross Site ScriptingWeb applications vulnerability
PHP is one of the most commonly used languages to develop web sites because of its simplicity, easy to learn and it can be easily embedded with any of the databases. A web developer with his basic knowledge developing an application... more
    • by 
    •   11  
      Computer ScienceInformation TechnologyWeb ApplicationsWorld Wide Web
    • by 
    • Cross Site Scripting
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to... more
    • by 
    •   6  
      Computer ScienceSocial EngineeringPhishingSecurity Risks
— Application-level web security refers to obligation inherent in the code of a web-application itself. few months ago application-level vulnerabilities have been exploited with serious consequences: hackers have good knowledge of... more
    • by 
    •   4  
      Web SecurityKey wordsDoSCross Site Scripting
    • by 
    •   6  
      Web DevelopmentSoftwareComputer SoftwareSql Injection
ABSTRACT Due to its distributed and open nature, Web Services give rise to new security challenges. This technology is susceptible to Cross-site Scripting (XSS) attack, which takes advantage of existing vulnerabilities. The proposed... more
    • by 
    •   7  
      Cognitive ScienceWeb ServicesComputer SoftwarePenetration Testing
    • by 
    •   12  
      XMLWeb ServicesDistributed SystemsSql Injection
    • by 
    •   8  
      DatabasesAutomationSql InjectionData Security
While the 21st century has seen the explosion of the Internet bubble and the arrival of Web 2.0, the standards have changed very little to support the growing number of new programs. Nevertheless developers have managed to continue... more
    • by 
    •   2  
      detect store XSS attacksCross Site Scripting
SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as... more
    • by 
    •   6  
      Web ApplicationsVulnerabilityWeb Application SecurityOWASP
Cross Site Scripting (XSS) attacks are most common vulnerability issues in the digital era for the Web applications. These attacks occur, when an attacker uses a web application to send malicious code in the form of client side script.... more
    • by 
    •   6  
      Computer ScienceComputer SecurityWeb SecurityWeb Proxy
Web applications are becoming a requisite mediator to provide access to the various on-line dynamic web services. As more features add to making interactive and efficient web applications, attackers get more options to bypass those... more
    • by  and +1
    •   4  
      Information SecurityWeb Application SecurityCross Site ScriptingXSS vulnerability
Web-based applications has turn out to be very prevalent due to the ubiquity of web browsers to deliver service oriented application on-demand to diverse client over the Internet and cross site scripting (XSS) attack is a foremost... more
    • by 
    •   8  
      Computer ScienceWeb page designWeb ApplicationWorld Wide Web
Cybersecurity is a global challenge as Cyberspace is never risk free. Cybersecurity ensures the attainment and maintenance of the security properties of the digital infrastructure and services against relevant security risks in the cyber... more
    • by 
    •   10  
      Secure Software DevelopmentCybersecurityMalwareWebGIS
Hypertext pre-processor (PHP), a server side scripting language very often used to develop a web application. Web application has a big importance in communication over internet. Web applications got very fast growth in past some time. To... more
    • by 
    •   6  
      VulnerabilityComputer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security OntologiesCyber ThreatsCross Site Scripting
Researchers have devised multiple solutions to cross-site scripting, but vulnerabilities persists in many Web applications due to developer " s lack of expertise in the problem identification and their unfamiliarity with the current... more
    • by 
    •   2  
      Cross Site ScriptingXss
Most web programs are vulnerable to cross site scripting (XSS) that can be exploited by injecting JavaScript code. Unfortunately, injected JavaScript code is difficult to distinguish from the legitimate code at the client side. Given... more
    • by 
    •   7  
      Information FilteringWeb ProgrammingHTMLFeature Extraction
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to... more
    • by  and +1
    •   4  
      Social EngineeringPhishingSecurity RisksCross Site Scripting
    • by 
    •   9  
      Web ServicesDatabasesSql InjectionWeb Application
—The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body,... more
    • by 
    •   7  
      Web ApplicationsProgram AnalysisUsable Security (Computer Security)Web Application Security
    • by 
    •   12  
      Static AnalysisData AnalysisWeb ApplicationsInformation Flow
    • by 
    •   9  
      GovernmentAutomataPhishingBehavior Modeling
    • by 
    •   4  
      Static AnalysisGenetic AlgorithmsGenetic AlgorithmCross Site Scripting
Web applications are constantly under attack. They are popular, typically accessible from anywhere on the Internet, and they can be abused as malware delivery systems. Cross-site scripting flaws are one of the most common types of... more
    • by 
    •   3  
      CSPCross Site ScriptingXss
Security issues of web applications are still a current topic of interest especially when considering the consequences of unintended behaviour. Such services might handle sensitive data about several thousands or millions of users. Hence,... more
    • by 
    •   3  
      Model-Based TestingCross Site ScriptingWeb Application Pentesting
    • by 
    •   6  
      Open SourceType SystemsLanguage UseType System
    • by 
    •   8  
      Open SourceWeb ApplicationHTMLMarkup Languages
    • by 
    •   7  
      PrivacyRisk ManagementWebHTML
    • by 
    •   7  
      Computer ScienceTechnologyWeb ApplicationsSql Injection
Government bringing innovation into its activities is a good gesture but innovation that constitutes peril due to inadequate technical capability necessitates re-assessment, hence this investigation.This study investigated susceptibility... more
    • by 
    •   18  
      TechnologyWeb 2.0Instructional TechnologyNew literacy studies
    • by 
    •   16  
      Computer ScienceMachine LearningSupport Vector MachinesWeb page design
    • by 
    •   6  
      Computer ScienceComputer SecurityWeb SecurityWeb Proxy
    • by 
    •   6  
      Web Application SecurityCross Site ScriptingXssFalse Positive Rate
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and... more
    • by 
    •   58  
      Cognitive PsychologyCognitive ScienceComputer ScienceProgramming Languages
    • by 
    •   9  
      Computational ModelingGenetic AlgorithmsWeb ApplicationsWeb page design
    • by 
    • Cross Site Scripting
    • by 
    •   6  
      Information SystemsEngineeringComputer ScienceComputer Software
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval process, by banking... more
    • by  and +2
    •   10  
      Network SecurityInternet BankingBanking & Financial ServicesAuthentication
    • by 
    •   4  
      Computer ScienceSocial Science Research NetworkWeb ApplicationCross Site Scripting
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces... more
    • by 
    •   5  
      Computer ScienceAnalytical ChemistrySensorsCross Site Scripting
Input sanitization mechanisms are widely used to mitigate vulnerabilities to injection attacks such as cross-site scripting. Static analysis tools and techniques commonly used to ensure that applications utilize sanitization functions.... more
    • by 
    •   6  
      Machine LearningStatic AnalysisProgram AnalysisSoftware Systems Security
PHP is one of the most commonly used languages to develop web sites because of its simplicity, easy to learn and it can be easily embedded with any of the databases. A web developer with his basic knowledge developing an application... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyWeb ApplicationsWeb 2.0 applications
    • by 
    •   6  
      Web DevelopmentSoftwareComputer SoftwareSql Injection
    • by 
    • Cross Site Scripting
    • by 
    •   4  
      Computer ScienceComputer SecurityScripting LanguageCross Site Scripting
    • by 
    •   4  
      VulnerabilitySql InjectionPenetration TestingCross Site Scripting
    • by 
    •   10  
      Web ServicesOpen SourceInformation ServicesHTML
Integrating security testing into the workflow of software developers not only can save resources for separate security testing but also reduce the cost of fixing security vulnerabilities by detecting them early in the development cycle.... more
    • by 
    •   6  
      Static AnalysisVulnerabilityWeb Application SecurityDynamic Analysis