Menu

Close
  • BIG DATA
  • BACK-END
  • FRONT-END
  • AGILITE
  • DEVOPS
  • CLOUD
Subscribe
Ippon | Experts en Innovation Java , DevOps, Big Data, Front-end, & Back-end Menu

Philippe_CERY

14 posts
← Newer Posts Page 2 of 3 Older Posts →

OWASP Top 10 - A6 Sensitive Data Exposure

Description We have seen in the previous articles that an experienced attacker can easily intercept data in transit (e.g. on a public Wifi hotspot) or »

Philippe_CERY on Front-End, Back-End 18 November 2013

OWASP Top 10 - A5 Security Misconfiguration

Description Nowadays, besides the operating system and the JRE, most of the Java applications are based on third-party frameworks, open-source or proprietary. Moreover, a web application »

Philippe_CERY on Front-End, Back-End 14 November 2013

OWASP Top 10 - A4 Insecure Direct Object References

Description The application exposes a direct reference (functional identifier, database key, file path…) to a resource. Thanks to that direct reference, an attacker can guess other »

Philippe_CERY on Front-End, Back-End 04 November 2013

OWASP Top 10 - A3 Cross Site Scripting (XSS)

Description Cross-Site Scripting is a specific consequence of an injection attack. The goal is to make a web browser execute arbitrary scripting code (Javascript, ActionScript, ActiveX… »

Philippe_CERY on Front-End, Back-End 28 October 2013

OWASP Top 10 - A2 Broken Authentication and Session Management

Description The attacker steals his victim’s credentials or any information that will help him impersonating the victim on your application. Examples Client attack To authenticate »

Philippe_CERY on Front-End, Back-End 21 October 2013
← Newer Posts Page 2 of 3 Older Posts →
Ippon | Experts en Innovation Java , DevOps, Big Data, Front-end, & Back-end © 2025
Proudly published with Ghost