Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Oracle JET for Developers

You're reading from   Oracle JET for Developers Implement client-side JavaScript efficiently for enterprise Oracle applications

Arrow left icon
Product type Paperback
Published in Dec 2017
Publisher Packt
ISBN-13 9781787284746
Length 282 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
 Malleswara Rao Pattamsetti Malleswara Rao Pattamsetti
Author Profile Icon Malleswara Rao Pattamsetti
Malleswara Rao Pattamsetti
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
1. Getting Started with Oracle JET FREE CHAPTER 2. Oracle Alta UI 3. Tool Integration 4. Knockout JS 5. Oracle JET Components – Form Elements, Controls, and Data Collections 6. OJ Components – Layouts, Navigation, and Visualizations 7. Framework 8. Hybrid Mobile Application Development 9. Testing and Debugging 10. Security and Version Migration

Common web application vulnerabilities


Application developers should be aware of the security guidelines and follow the standards to ensure they build a secure web application. Web application vulnerabilities are some of the commonly occurring mistakes in application development, and can lead to data breach in our applications and can compromise our applications' security. There are a number of software solutions (such as CheckMarx) available to determine security violations in applications via a software scan, and to fix the problems. Let us review the most common web application vulnerabilities in the upcoming sections.

Cross-Site Scripting (XSS)

An XSS vulnerability occurs due to insufficient client-side validation on web pages if the web pages load the data from users and include this in web pages without validating the data. This lets the hacker’s script execute on a victim's browser and show arbitrary content, that the victim believes is real and from the application, and so he provides...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime
Visually different images