Download Netsparker

Command Injection Vulnerability

Category: Web Security Readings - Tags: command injection vulnerability , web application vulnerability - Tue, 16 Aug 2016, by Sven Morgenroth
This article explains what is the command injection vulnerability, how it works (how malicious hackers can exploit it) and also explains how to ensure your web applications are not vulnerable to this vulnerability. Read more...

DOM Based Cross-site Scripting Vulnerability

Category: Web Security Readings - Tags: web application security , web application vulnerability , dom xss - Tue, 15 Jul 2014, by Ferruh Mavituna
A web security article that explains what is a DOM based cross-site scripting using real live coding examples. The article also explains why the traditional XSS remediation methods do not work and what you can do to ensure that your web applications are not vulnerable to DOM based cross-site scripting vulnerability. Read more...

SQL Injection - Understanding and Protection

In this second part of the SQL Injection article, the author explains how an SQL Injection works using simple examples. He also explains what web application developers can do to write more secure code and develop web applications that are not vulnerable to SQL Injections. But that's not just it. He also explains what web masters should and can do to improve the security of their web applications and containment policies. Read more...

14 Years of SQL Injection and still the most dangerous vulnerability

Category: Web Security Readings - Tags: sql injection , web application vulnerability , web application security - Thu, 22 Aug 2013, by Alex Baker
This is the first of a two part article about SQL Injection vulnerability. In this first part of this web security article, Alex Baker looks into the history of SQL Injection to tries to determine why after 14 years since its discovery, SQL Injection is still the most widely exploited web application vulnerability these days. Read more...

Follow us