Vulnerabilities are the weakness which an attacker can
take advantage by exploiting it to gain unauthorized access to
the target. There are lots of vulnerabilities that can be
exploited but three of the most common web application
vulnerabilities that exist in a web application are structured
query language (SQL) injection, cross-site scripting, and
buffer overflow. SQL injection is an attack in which the
attacker inserts SQL commands into form or parameter values
[1]. It exploits the use of SQL query in the application. Crosssite
scripting (XSS) is an attack that exploits the use of
JavaScript in a web. JavaScript is collection of codes that is
downloaded into user’s browser to enable form submission.
As the confidential information is filled in the form and
submitted onto the internet, it would be much easier for a
hacker to steal this information by using XSS [2]. Buffer
overflow is an exploit that can make the memory allocated to a
certain application become massive [3]. For example, an
application expecting five-digit postcode therefore the
programmer only allocates enough memory for the perimeter.
If an attacker enters more than five digits for example
hundreds of digit, the application will end up using more
memory than what it should.
D1 2014 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE) , April 7 - 8, 2014, Penang, Malaysia
978-1-