The research area of this paper is focused not only on the study of various vulnerabilities such as Unvalidated Input, Broken access control, Broken Authentication and Sessions management,
Insecure Configuration Management, Improper Error Handling, parameter modification, cookie modification and directory traversal. But also the methods on how to detect and provide security mechanism to protect the web applications.