O'Reilly logo

The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web by Ron Lepofsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 3

image

Web Application Vulnerabilities and the Damage They Can Cause

The obvious risks to a security breach are that unauthorized individuals: 1) can gain access to restricted information and 2) may be able to escalate their privileges in order to compromise the application and the entire application environment. The areas that can be compromised include user and system administration accounts.

This chapter identifies the major classes of web application vulnerabilities, gives some examples of actual vulnerabilities found in real-life web application audits, and describes their associated level of risk. The classes are:

  • authentication
  • session ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required