4. Feedback
This chapter presents case studies of safety audits and their implementation in an operational context.
4.1 Problems encountered during audits
In terms of spot audits, we noted the following :
common XSS vulnerabilities, in particular DOM-Based XSS ;
SQL injection vulnerabilities are becoming less and less common;
very rare file/resource injection vulnerabilities ;
vulnerabilities involving inadequate protection of sensitive data (e.g. passwords), which are quite common ;
common misconfiguration vulnerabilities.
There are several possible reasons...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Feedback
Bibliography
Works
- SHEWHART (S.), WALTER (A.) - Economic control of quality of manufactured product/50 th anniversary commemorative issue. - American Society for Quality December 1980. ISBN 0-87389-076-0. OCLC 223422287 (1930).
Also in our database
- ...
Websites
• Agarri – Specialized in offensive aspects of information security http://www.agarri.fr
• Alexa – Provides information about websites http://www.alexa.com
• BEFF – The Browser Exploitation Framework Project – Using XSS encryption
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference