Link Details

Link 968519 thumbnail
User 754693 avatar

By solidstone
via findbestopensource.com
Submitted: May 14 2013 / 00:46

The vulnerabilities could be SQL injection, Network attack, Cross site scripting, File handling errors and lot more. Programmers might not have done defensive coding and it might have opened a hole. It is always good to analyze your code using these tools and detect any vulnerability.
  • 2
  • 0
  • 165
  • 83

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (2)



Voters Against This Link (0)



    Debugging JavaScript
    Written by: Ashutosh Sharma
    Featured Refcardz: Top Refcardz:
    1. Design Patterns
    2. OO JS
    3. Cont. Delivery
    4. Java EE7
    5. HTML5 Mobile
    1. Java EE7
    2. Spring Annotations
    3. Git
    4. Java
    5. REST