1. Background and software developments
Figure 1 describes the most common classes of vulnerabilities found on websites audited by Whitehat Security. We can see that many of the vulnerabilities exceed a rate of 20% presence, which is quite worrying. Figure 2 is based on the same principles, but with data from TrustWave.
Correlations between these two studies are observable. One example is the strong presence of "Cross-Site Scripting" and "Cross-Site Request Forgery" vulnerabilities. A full description of each of these vulnerabilities can be found at
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Background and software developments
Bibliography
Works
- SHEWHART (S.), WALTER (A.) - Economic control of quality of manufactured product/50 th anniversary commemorative issue. - American Society for Quality December 1980. ISBN 0-87389-076-0. OCLC 223422287 (1930).
Also in our database
- ...
Websites
• Agarri – Specialized in offensive aspects of information security http://www.agarri.fr
• Alexa – Provides information about websites http://www.alexa.com
• BEFF – The Browser Exploitation Framework Project – Using XSS encryption
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference