Back to Results
First PageMeta Content
Computer network security / Computing / Risk / Hacking / Vulnerability / Cross-site scripting / CVSS / Penetration test / Fortify Software / Cyberwarfare / Computer security / Software testing


White paper HP 2012 Cyber Risk Report
Add to Reading List

Document Date: 2013-02-25 11:05:35


Open Document

File Size: 1,53 MB

Share Result on Facebook

Company

HP / Oracle / Injection / Microsoft / /

Event

Product Issues / /

IndustryTerm

cross-site / Web application vulnerabilities Devastating / Web applications / reflected cross-site / networks / typical cross-site / Web browsers / Mature technologies / expertise in specific systems / Web application / Web vulnerabilities / selected applications / widespread cross-site / Web application security looks / Web application vs. non-Web application vulnerabilities / mobile payment applications / vulnerabilities Web applications / session management / Web app vulnerabilities / mining / Web vulnerability research / nearfield communications / manufacturing / prevalent software technology / asset management / mature technology / legacy technology / Web application vulnerabilities To / risk Web applications / Web application vulnerabilities / /

Organization

Department of Homeland Security / /

Position

ZDI researcher / /

Product

SQL injection / session management Injection / session management / authentication / /

ProgrammingLanguage

SQL / Java / JavaScript / /

Technology

seemingly mature technologies / legacy technology / Java / prevalent software technology / 21 Conclusions Vulnerability weaponization Mobile vulnerabilities Mature technologies / threat Mature technologies / mobile devices / /

URL

zerodayinitiative.com / osvdb.org / fortifymyapp.com / /

SocialTag