Application attacks (buffer overflows, cross-site scripting)

Get the latest news and information on recognizing vulnerabilities and defending against application attacks and threats such as buffer overflows, cross site scripting, SQL injections.

Application attacks (buffer overflows, cross-site scripting) News

  • April 22, 2019 22 Apr'19

    IoT device testing made possible with BeStorm X

    BeStorm X, a black-box fuzzer by Beyond Security and Ubiquitous AI, tests IoT devices to identify security weaknesses and vulnerabilities before they're exploited.

  • March 19, 2019 19 Mar'19

    Critical WinRAR bug exploited in targeted attacks

    A critical WinRAR bug that was exposed after 19 years is already being exploited in targeted attacks in the Middle East and United States, despite the availability of patch.

  • February 25, 2019 25 Feb'19

    WinRAR bug found and patched after 19 years

    A WinRAR bug that affects every version of the app over the past 19 years was discovered and patched. But it's unclear if the millions of the app's users will get the needed fix.

  • October 22, 2018 22 Oct'18

    Zero-day jQuery plugin vulnerability exploited for 3 years

    A zero-day in jQuery File Upload could affect thousands of projects because the jQuery plugin vulnerability has existed for eight years and actively exploited for at least three years.

View All News

Application attacks (buffer overflows, cross-site scripting) Get Started

Bring yourself up to speed with our introductory content

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit. The term has its roots in the military and is often associated with the capacity of executable malicious code  to do damage. Technically, the payload of a ... Continue Reading

  • cache poisoning (DNS poisoning, web cache poisoning)

    Cache poisoning is an attack vector that exploits the way domain name system (DNS) clients and web servers improve performance by saving old responses for a specified period of time in a temporary storage area called cache. Continue Reading

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both. Continue Reading

View All Get Started

Evaluate Application attacks (buffer overflows, cross-site scripting) Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Application attacks (buffer overflows, cross-site scripting)

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Application attacks (buffer overflows, cross-site scripting) Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close