2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT) 2015
DOI: 10.1109/acsat.2015.46
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Web Application Vulnerability Attacks

Abstract: Web applications have become an essential part of our daily life. Since web applications contain valuable sensitive information, hackers try to find vulnerabilities and exploit them in order to impersonate the user, steal information, or sabotage the application. This paper illustrates in detail the most prevailing and harmful web application vulnerability attacks: SQL Injection, Broken Authentication and Session Management, and Cross-Site Scripting (XSS).

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 5 publications
(4 reference statements)
0
12
0
Order By: Relevance
“…Since HTML archives have a level, serial structure that blends control statements, formatting, and the genuine substance, any non-validated user-supplied information included within the resulting page without legitimate HTML encoding, may lead to markup injection [7]. A reflected attack is typically conveyed through e-mail or an impartial web location.…”
Section: What Is Xxsmentioning
confidence: 99%
“…Since HTML archives have a level, serial structure that blends control statements, formatting, and the genuine substance, any non-validated user-supplied information included within the resulting page without legitimate HTML encoding, may lead to markup injection [7]. A reflected attack is typically conveyed through e-mail or an impartial web location.…”
Section: What Is Xxsmentioning
confidence: 99%
“…ii) Union-based SQLi Union-based SQLi [3] uses the UNION SQL supervisor to join the consequences of something close to two SELECT clarifications into a solitary outcome is then send back as an important piece of the HTTP reaction.…”
Section: Types Of Sql Injection (Sqli)mentioning
confidence: 99%
“…A study conducted on SQLi, Broken Authentication, Session Management, and XSS web application vulnerability. The author discussed the code level problem analysis of those application layer weaknesses and recommended a guideline for the developers to secure the web application [17]. A study performed on root cause analysis to detect the Session Management and Broken Authentication vulnerabilities and prescribed solutions have been given to reduce the recurring attack of the web application [18].…”
Section: Introductionmentioning
confidence: 99%