Myth or reality? This paper at imperva.com shows how relatively simple techniques can be used to automatically find and attack vulnerable application servers. Looks plausible enough to me.
You’ve been warned: use a serious framework for your next project ;-)
This entry was posted on Wednesday, March 31st, 2004 at 8:00 am and is filed under The Web. You can follow any responses to this entry through the RSS 2.0 feed.
Both comments and pings are currently closed.
Well, even if Cocoon doesn’t have some of the wide-open holes that some systems have, protecting from SQL injection is not built into the framework and requires careful inspection of direct transmission of request parameters to SQL queries…
Anyway, thanks for the pointers, this is an interesting read!
cat myself | sort | head -2
Bertrand Delacrétaz here - my "résumé" will tell you more.
The opinions expressed here are my own, I'm not representing any group or company on this blog. YMMV.
RT @lesjoiesducode: Pour rappel : OVHcloud organise l'événement Very Tech Trip le 2 février prochain, à la Cité des sciences et de l'indust… 1 month ago
Well, even if Cocoon doesn’t have some of the wide-open holes that some systems have, protecting from SQL injection is not built into the framework and requires careful inspection of direct transmission of request parameters to SQL queries…
Anyway, thanks for the pointers, this is an interesting read!