- SQL injection
- Use stored procedures , use parameterized dynamic SQL queries
- Sanitize input parameters which are coming from UI before feeding them into stored procedures or dynamic SQL statements
- Use stored procedures as you can
- Use parametrized in-line SQL query
- SQL safe your queries by : Replace("'","''").Replace(";","")
- Cross site scripting
- Securing cookies
- Turning off cross site scripting HttpOnly
- HTML encoding all user inputs before storing in DB
- Prevent file system traversal
- Allowing filenames containing “../..” could allow the hacker to traverse through file system
- IIS 6 vulnerabilities on file extensions
- Filename.asp.jpg is ran as an asp page!
- Keep your web servers up-to-date with OS patches
Related Links:
No comments:
Post a Comment