Types of API Tools
APIs are becoming an increasingly large portion of the software that powers the Internet including mobile applications, single-page applications (SPAs) and cloud infrastructure. While APIs share...
Browse medical articles by letter, category, and search. Built for large health libraries.
APIs are becoming an increasingly large portion of the software that powers the Internet including mobile applications, single-page applications (SPAs) and cloud infrastructure. While APIs share...
Early on, two primary types of XSS were identified, Stored XSS and Reflected XSS. In 2005, Amit Klein defined a third type of XSS, which Amit coined DOM Based XSS....
The attack aims to explore flaws in the decoding mechanism implemented on applications when decoding Unicode data format. An attacker can use this technique to encode...
Uploaded files represent a significant risk to applications. The first step in many attacks is to get some code to the system to be attacked. Then...
There are several functions which – under certain circumstances, if used in a signal handler – may result in the corruption of memory, allowing for exploitation...
Mobile code, such as a Java Applet, is code that is transmitted across a network and executed on a remote machine. Because mobile code developers have...
This vulnerability is caused by unsafe use of the reflection mechanisms in programming languages like Java or C#. An attacker may be able to create unexpected...
The use of a hard-coded password increases the possibility of password guessing tremendously. Consequences Authentication: If hard-coded passwords are used, it is almost certain that malicious...
The use of deprecated or obsolete functions may indicate neglected code. As programming languages evolve, functions occasionally become obsolete due to: Advances in the language Improved...
Referencing memory after it has been freed can cause a program to crash. The use of heap allocated memory after it has been freed or deleted...
The code included in this article has not been reviewed and should not be used without proper analysis. If you have reviewed the included code or...
Request validation is a feature in ASP.NET that examines HTTP requests and determines whether they contain potentially dangerous content. This check adds protection from mark-up or code...