When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. XML external entity attack - Wikipedia

    en.wikipedia.org/wiki/XML_external_entity_attack

    This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, DoS attacks , server-side request forgery , port scanning from the perspective of the machine where the parser is located, and other [ which? ] system impacts.

  3. Billion laughs attack - Wikipedia

    en.wikipedia.org/wiki/Billion_laughs_attack

    The example attack consists of defining 10 entities, each defined as consisting of 10 of the previous entity, with the document consisting of a single instance of the largest entity, which expands to one billion copies of the first entity. In the most frequently cited example, the first entity is the string "lol", hence

  4. Cross-site scripting - Wikipedia

    en.wikipedia.org/wiki/Cross-site_scripting

    XML external entity; Browser security; Metasploit Project, an open-source penetration testing tool that includes tests for XSS; w3af, an open-source web application security scanner; DOMPurify, a free and open source code library by Cure53 to reduce susceptibility to XSS vulnerabilities in websites. Cross-document messaging; Samy (computer worm)

  5. OWASP - Wikipedia

    en.wikipedia.org/wiki/OWASP

    The Open Worldwide Application Security Project (formerly Open Web Application Security Project [7]) (OWASP) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of IoT, system software and web application security. [8] [9] [10] The OWASP provides free and open ...

  6. Code injection - Wikipedia

    en.wikipedia.org/wiki/Code_injection

    Code injection is a computer security exploit where a program fails to correctly process external data, such as user input, causing it to interpret the data as executable commands. An attacker using this method "injects" code into the program while it is running.

  7. HTTP header injection - Wikipedia

    en.wikipedia.org/wiki/HTTP_header_injection

    HTTP header injection is a general class of web application security vulnerability which occurs when Hypertext Transfer Protocol (HTTP) headers are dynamically generated based on user input. Header injection in HTTP responses can allow for HTTP response splitting , session fixation via the Set-Cookie header, cross-site scripting (XSS), and ...

  8. ModSecurity - Wikipedia

    en.wikipedia.org/wiki/ModSecurity

    Free and open-source software portal; ModSecurity, sometimes called Modsec, is an open-source web application firewall (WAF). Originally designed as a module for the Apache HTTP Server, it has evolved to provide an array of Hypertext Transfer Protocol request and response filtering capabilities along with other security features across a number of different platforms including Apache HTTP ...

  9. Dynamic application security testing - Wikipedia

    en.wikipedia.org/wiki/Dynamic_Application...

    DAST tools facilitate the automated review of a web application with the express purpose of discovering security vulnerabilities and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, such as input/output validation: (e.g. cross-site scripting and SQL injection ...