projects.webappsec.org

Website:http://projects.webappsec.org
Upvotes received3
Downvotes received2
Karma:2 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (100)

1

2 Thumbs up   1 Thumbs down

Cookie


Small amount of data sent by the web server, to a web client, which can be stored and retrieved at a later time. Typically cookies are used to keep track of a user’s state as they traverse a web site. [..]
Source: projects.webappsec.org

2

1 Thumbs up   1 Thumbs down

SQL Injection


An attack technique used to exploit web sites by altering backend SQL statements through manipulating application input. See also “Parameter Tampering”, “Form Field Manipulation”.
Source: projects.webappsec.org

3

1 Thumbs up   1 Thumbs down

SQL injection


An attack technique used to exploit web sites by altering backend SQL statements through manipulating application input. See also “Parameter Tampering”, “Form Field Manipulation”.
Source: projects.webappsec.org

4

0 Thumbs up   0 Thumbs down

description


The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to clarify the language used within the community.
Source: projects.webappsec.org

5

0 Thumbs up   0 Thumbs down

ActiveX Controls


A program, called a “control”, developed using ActiveX controls technologies. ActiveX controls controls can be downloaded and executed within technology-enabled Web browsers. ActiveX controls is a set [..]
Source: projects.webappsec.org

6

0 Thumbs up   0 Thumbs down

Ajax


AJAX stands for Asynchronous JavaScript and XML. This browser based technology allows a website to perform additional resource requests without refreshing the user page by utilizing the XMLHttpRequest [..]
Source: projects.webappsec.org

7

0 Thumbs up   0 Thumbs down

application server


A software server, normally using HTTP, which has the ability to execute dynamic web applications. Also known a middleware, this piece of software is normally installed on or near the web server where [..]
Source: projects.webappsec.org

8

0 Thumbs up   0 Thumbs down

Attack


A well-defined set of actions that, if successful, would result in either damage to an asset, or undesirable operation
Source: projects.webappsec.org

9

0 Thumbs up   0 Thumbs down

Authentication


The process of verifying the identity or location of a user, service or application. Authentication is performed using at least one of three mechanisms: “something you have”, “something you know” or “ [..]
Source: projects.webappsec.org

10

0 Thumbs up   0 Thumbs down

Authorization


The determination of what resources a user, service or application has permission to access. Accessible resources can be URL’s, files, directories, servlets, databases, execution paths, etc. See also [..]
Source: projects.webappsec.org


To view all 100 definitions, please sign in.