Background and software developments
Web security audits - Methodologies, tools and experience return
Article REF: H5135 V1
Background and software developments
Web security audits - Methodologies, tools and experience return

Author : Laurent BUTTI

Publication date: April 10, 2014 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

1. Background and software developments

Figure 1 describes the most common classes of vulnerabilities found on websites audited by Whitehat Security. We can see that many of the vulnerabilities exceed a rate of 20% presence, which is quite worrying. Figure 2 is based on the same principles, but with data from TrustWave.

Correlations between these two studies are observable. One example is the strong presence of "Cross-Site Scripting" and "Cross-Site Request Forgery" vulnerabilities. A full description of each of these vulnerabilities can be found at

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details