Binary Planting
Binary planting is a general term for an attack where the attacker places (i.e., plants) a binary file containing malicious code to a local or remote...
Browse medical articles by letter, category, and search. Built for large health libraries.
Binary planting is a general term for an attack where the attacker places (i.e., plants) a binary file containing malicious code to a local or remote...
Blind SQL (Structured Query Language) injection is a type of SQL Injection attack that asks the database true or false questions and determines the answer based on the...
XPath is a type of query language that describes how to locate specific elements (including attributes, processing instructions, etc.) in an XML document. Since it is...
A common threat web developers face is a password-guessing attack known as a brute force attack. A brute-force attack is an attempt to discover a password...
Access control, sometimes called authorization, is how a web application grants access to content and functions to some users and not others. These checks are performed...
A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to...
This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may...
OWASP BLT is a bug-hunting & logging tool which allows users and companies to hunt for bugs, claim bug bounties and also to start bug-hunting sprees/contests respectively. It...
Weaknesses in this category identify some of the underlying problems that commonly allow attackers to manipulate the business logic of an application. Errors in business logic...
Java source code is typically compiled into Java bytecode — the instruction set of the Java virtual machine. The compiled Java bytecode can be easily reversed...
C-Based Toolchain Hardening is a treatment of project settings that will help you deliver reliable and secure code when using C, C++ and Objective C languages...
The impact of a maliciously constructed response can be magnified if it is cached either by a web cache used by multiple users or even the...