![](/assets/images/picto-drapeau-france-OnZXal1.png)
4. Feedback
This chapter presents case studies of safety audits and their implementation in an operational context.
4.1 Problems encountered during audits
In terms of spot audits, we noted the following :
common XSS vulnerabilities, in particular DOM-Based XSS ;
SQL injection vulnerabilities are becoming less and less common;
very rare file/resource injection vulnerabilities ;
vulnerabilities involving inadequate protection of sensitive data (e.g. passwords), which are quite common ;
common misconfiguration vulnerabilities.
There are several possible reasons...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
![](/assets/images/logo-eti-KGYj7ZH.png)
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Feedback
Bibliography
Works
- SHEWHART (S.), WALTER (A.) - Economic control of quality of manufactured product/50 th anniversary commemorative issue. - American Society for Quality December 1980. ISBN 0-87389-076-0. OCLC 223422287 (1930).
Also in our database
- ...
Websites
• Agarri – Specialized in offensive aspects of information security http://www.agarri.fr
• Alexa – Provides information about websites http://www.alexa.com
• BEFF – The Browser Exploitation Framework Project – Using XSS encryption
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
![](/assets/images/logo-eti-KGYj7ZH.png)
The Ultimate Scientific and Technical Reference