1. Background and software developments
Figure 1 describes the most common classes of vulnerabilities found on websites audited by Whitehat Security. We can see that many of the vulnerabilities exceed a rate of 20% presence, which is quite worrying. Figure 2 is based on the same principles, but with data from TrustWave.
Correlations between these two studies are observable. One example is the strong presence of "Cross-Site Scripting" and "Cross-Site Request Forgery" vulnerabilities. A full description of each of these vulnerabilities can be found at
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Background and software developments
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Works
- SHEWHART (S.), WALTER (A.) - Economic control of quality of manufactured product/50 th anniversary commemorative issue. - American Society for Quality December 1980. ISBN 0-87389-076-0. OCLC 223422287 (1930).
Also in our database
- ...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!