Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Study of Ajax Template Injection in Web Applications

View through CrossRef
Cyber-attacks are becoming increasingly frequent, causing a lot of damage. Cyber-attacks have crippled our economic infrastructure both directly and indirectly. Attackers steal our valuable data by compromising web application security loopholes. Developers can prevent cyber-attacks using latest web technologies. Since web technologies are becoming more secure, cyber attackers are getting more incursive to find out the zero day vulnerability of the targeted system to breach the security. Nowadays most damaging attacks are done using zero-day vulnerability. An Ajax template injection is such an attack: An unauthenticated attacker dumps database table credentials by intercepting server response. Owing to the damage caused by an Ajax template injection, it can be counted among the OWASP top ten web application vulnerabilities in the near future. This paper discusses the idea of an Ajax template injection and its impact on Ajax-based web applications. This paper also provides statistical data about the percentage of Ajax-based web application vulnerabilities in Bangladesh.   
Title: A Study of Ajax Template Injection in Web Applications
Description:
Cyber-attacks are becoming increasingly frequent, causing a lot of damage.
Cyber-attacks have crippled our economic infrastructure both directly and indirectly.
Attackers steal our valuable data by compromising web application security loopholes.
Developers can prevent cyber-attacks using latest web technologies.
Since web technologies are becoming more secure, cyber attackers are getting more incursive to find out the zero day vulnerability of the targeted system to breach the security.
Nowadays most damaging attacks are done using zero-day vulnerability.
An Ajax template injection is such an attack: An unauthenticated attacker dumps database table credentials by intercepting server response.
Owing to the damage caused by an Ajax template injection, it can be counted among the OWASP top ten web application vulnerabilities in the near future.
This paper discusses the idea of an Ajax template injection and its impact on Ajax-based web applications.
This paper also provides statistical data about the percentage of Ajax-based web application vulnerabilities in Bangladesh.
   .

Related Results

Overview of Key Zonal Water Injection Technologies in China
Overview of Key Zonal Water Injection Technologies in China
Abstract Separated layer water injection is the important technology to realize the oilfield long-term high and stable yield. Through continuous researches and te...
Optimal Injection Parameters for Enhancing Coalbed Methane Recovery: A Simulation Study from the Shizhuang Block, Qinshui Basin, China
Optimal Injection Parameters for Enhancing Coalbed Methane Recovery: A Simulation Study from the Shizhuang Block, Qinshui Basin, China
The injection of N2 into coal reservoir has great potential in improving recovery of coalbed methane (CBM). In this study, a numerical model was established based on the GEM compon...
Application of Novel Techniques to Fractured Injection Diagnostics in Waterflood Developments
Application of Novel Techniques to Fractured Injection Diagnostics in Waterflood Developments
Abstract Controlled injection at high rates predominantly under fracture regime has been identified at the onset of most waterflood field developments as being cruci...
Control of Water Injection into a Layered Formation
Control of Water Injection into a Layered Formation
Abstract In previously published work, we have analyzed transient injection of water from a growing vertical hydrofracture into a low-permeability compressible rock ...
Helenus and Ajax, Two Groups of Non-Autonomous LTR Retrotransposons, Represent a New Type of Small RNA Gene-Derived Mobile Elements
Helenus and Ajax, Two Groups of Non-Autonomous LTR Retrotransposons, Represent a New Type of Small RNA Gene-Derived Mobile Elements
Terminal repeat retrotransposons in miniature (TRIMs) are short non-autonomous long terminal repeat (LTR) retrotransposons found from various eukaryotes. Cassandra is a unique TRIM...
Design And Operation Of The Levelland Unit CO2 Injection Facility
Design And Operation Of The Levelland Unit CO2 Injection Facility
Abstract The Levelland CO2 Facility provides CO2 storageand handling capacity for the five CO2 injection pilots located in the Levelland Unit. Facilities pilots l...
Waterflood Optimization in Nahr Umr Sandstone Reservoir in Bahrain Field Using Ensemble of Novel Analytical Techniques
Waterflood Optimization in Nahr Umr Sandstone Reservoir in Bahrain Field Using Ensemble of Novel Analytical Techniques
Abstract The Sandstone reservoir is on production since 1941. Water injection (WI) started since January 2013 and full fledge injection commenced through injectors i...
Alternative Injection and Its Seepage Mechanism of Polymer Flooding in Heterogeneous Reservoirs
Alternative Injection and Its Seepage Mechanism of Polymer Flooding in Heterogeneous Reservoirs
Abstract Field application proves that polymer flooding is an effective technology for improving development effect of heterogeneous reservoirs. Previously, single s...

Back to Top