www.techrepublic.com
Open in
urlscan Pro
2.20.190.228
Public Scan
URL:
https://www.techrepublic.com/resource-library/whitepapers/10-dangerous-app-vulnerabilities-to-watch-out-for-free-pdf/?ftag=CM...
Submission: On September 16 via api from US
Submission: On September 16 via api from US
Form analysis
5 forms found in the DOMName: site-search — /search/
<form class="site-search" name="site-search" action="/search/">
<fieldset><input name="q" placeholder="What are you looking for?" type="search" autocomplete="off" title="What are you looking for?" value="" class="smart-search-input smart-search-desktop"><button class="smart-search-button" type="submit"
data-omniture-track="moduleClick" data-omniture-track-data="{"moduleInfo": "header-search-overlay"}">
<a class="search-button">
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 483.083 483.083"><g><g><path d="M332.74,315.35c30.883-33.433,50.15-78.2,50.15-127.5C382.89,84.433,298.74,0,195.04,0S7.19,84.433,7.19,187.85
S91.34,375.7,195.04,375.7c42.217,0,81.033-13.883,112.483-37.4l139.683,139.683c3.4,3.4,7.65,5.1,11.9,5.1s8.783-1.7,11.9-5.1
c6.517-6.517,6.517-17.283,0-24.083L332.74,315.35z M41.19,187.85C41.19,103.133,110.04,34,195.04,34
c84.717,0,153.85,68.85,153.85,153.85S280.04,341.7,195.04,341.7S41.19,272.567,41.19,187.85z"></path></g></g></svg></a>
<div class="go-button hide">GO</div>
</button>
</fieldset>
</form>
Name: site-search — /search/
<form class="site-search" name="site-search" action="/search/">
<fieldset><input name="q" placeholder="What are you looking for?" type="search" autocomplete="off" title="What are you looking for?" value="" class="smart-search-input smart-search-mobile"><button class="smart-search-button" type="submit"
data-omniture-track="moduleClick" data-omniture-track-data="{"moduleInfo": "header-search-overlay"}">
<a class="search-button">
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 483.083 483.083"><g><g><path d="M332.74,315.35c30.883-33.433,50.15-78.2,50.15-127.5C382.89,84.433,298.74,0,195.04,0S7.19,84.433,7.19,187.85
S91.34,375.7,195.04,375.7c42.217,0,81.033-13.883,112.483-37.4l139.683,139.683c3.4,3.4,7.65,5.1,11.9,5.1s8.783-1.7,11.9-5.1
c6.517-6.517,6.517-17.283,0-24.083L332.74,315.35z M41.19,187.85C41.19,103.133,110.04,34,195.04,34
c84.717,0,153.85,68.85,153.85,153.85S280.04,341.7,195.04,341.7S41.19,272.567,41.19,187.85z"></path></g></g></svg></a>
<div class="go-button hide">GO</div>
</button>
</fieldset>
</form>
/resource-library/search/
<form action="/resource-library/search/" data-component="directorySuggestiveSearch">
<input type="text" value="" placeholder="Search our entire library" name="q" autocomplete="off" id="search-dir-q" onfocus="this.placeholder = ''" onblur="this.placeholder = 'Search our entire library'">
<div class="suggestion-wrapper">
<ul class="suggestions"></ul>
</div>
<button type="submit" class="directory-search-button" id="directory-search-button">Search <svg width="24" height="24" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg" fill-rule="evenodd" clip-rule="evenodd">
<path
d="M15.853 16.56c-1.683 1.517-3.911 2.44-6.353 2.44-5.243 0-9.5-4.257-9.5-9.5s4.257-9.5 9.5-9.5 9.5 4.257 9.5 9.5c0 2.442-.923 4.67-2.44 6.353l7.44 7.44-.707.707-7.44-7.44zm-6.353-15.56c4.691 0 8.5 3.809 8.5 8.5s-3.809 8.5-8.5 8.5-8.5-3.809-8.5-8.5 3.809-8.5 8.5-8.5z">
</path>
</svg></button>
</form>
<form name="">
<select name="topic" onchange="if (this.value) { window.location.href=this.value; }">
<option selected="" value="">More Topics</option>
<option value="/resource-library/topic/android/">Android</option>
<option value="/resource-library/topic/apple/">Apple</option>
<option value="/resource-library/topic/australia/">Australia</option>
<option value="/resource-library/topic/banking/">Banking</option>
<option value="/resource-library/topic/consumerization/">Consumerization</option>
<option value="/resource-library/topic/cxo/">CXO</option>
<option value="/resource-library/topic/developer/">Developer</option>
<option value="/resource-library/topic/google/">Google</option>
<option value="/resource-library/topic/microsoft/">Microsoft</option>
<option value="/resource-library/topic/open-source/">Open Source</option>
<option value="/resource-library/topic/printers/">Printers</option>
<option value="/resource-library/topic/smbs/">SMBs</option>
<option value="/resource-library/topic/social-enterprise/">Social Enterprise</option>
<option value="/resource-library/topic/start-ups/">Start-Ups</option>
<option value="/resource-library/topic/tech-and-work/">Tech & Work</option>
<option value="/resource-library/topic/tech-industry/">Tech Industry</option>
</select>
</form>
<form name="">
<label for="footer-cbsi-site-links">Visit other CBS Interactive sites:</label>
<select id="footer-cbsi-site-links" name="target" onchange="if (this.value.indexOf('http') != -1) { window.location.href=this.value; }" title="Visit other CBS Interactive sites" data-omniture-track="moduleClick"
data-omniture-track-data="{"moduleInfo": "footer-copyright-links"}">
<option selected="" value="">Select Site</option>
<option value="http://www.cbscares.com">CBS Cares</option>
<option value="http://www.cbsfilms.com">CBS Films</option>
<option value="http://www.cbsradio.com/streaming/index.html">CBS Radio</option>
<option value="http://www.cbs.com">CBS.com</option>
<option value="http://www.cbsinteractive.com">CBS Interactive</option>
<option value="http://www.cbsnews.com">CBSNews.com</option>
<option value="http://www.cbssports.com">CBSSports.com</option>
<option value="http://www.chowhound.com">Chowhound</option>
<option value="http://www.clicker.com">Clicker</option>
<option value="https://www.cnet.com">CNET</option>
<option value="http://collegenetwork.cbssports.com">College Network</option>
<option value="http://www.gamespot.com">GameSpot</option>
<option value="http://www.last.fm">Last.fm</option>
<option value="http://www.maxpreps.com">MaxPreps</option>
<option value="http://www.metacritic.com">Metacritic.com</option>
<option value="http://www.cbsnews.com/moneywatch/">Moneywatch</option>
<option value="http://www.mysimon.com">mySimon</option>
<option value="http://www.radio.com">Radio.com</option>
<option value="http://www.search.com">Search.com</option>
<option value="http://www.shopper.com">Shopper.com</option>
<option value="http://www.sho.com">Showtime</option>
<option value="https://www.techrepublic.com">TechRepublic</option>
<option value="http://www.theinsider.com">The Insider</option>
<option value="http://www.tv.com">TV.com</option>
<option value="http://www.urbanbaby.com">UrbanBaby.com</option>
<option value="http://www.zdnet.com">ZDNet</option>
</select>
</form>
Text Content
Search GO * IT Policy Downloads * 5G * Developer * Top DaaS providers * Security * More * Excel tips * Cloud * Big Data * Digital Transformation * CIO * Smart Cities * TechRepublic Academy * Best VPN Services * All Topics * Sections: * Photos * Videos * All Writers * * Newsletters * Forums * Resource Library * TR Premium * Editions: US * United States * Australia * United Kingdom * Japan * * Newsletters * Forums * Resource Library * TR Premium * My Profile * Preferences * Premium * Newsletters * Community * Log Out * * Search GO * * Topics: * IT Policy Downloads * 5G * Developer * Top DaaS providers * Security * Excel tips * Cloud * Big Data * Digital Transformation * CIO * Smart Cities * TechRepublic Academy * Best VPN Services * All Topics * Sections: * Photos * Videos * All Writers * * Newsletters * Forums * Resource Library * TR Premium * Editions: US * United States * Australia * United Kingdom * Japan * * My Profile * Preferences * Premium * Newsletters * Community * Log Out 10 DANGEROUS APP VULNERABILITIES TO WATCH OUT FOR (FREE PDF) View this now Provided by: TechRepublic Topic: Security Format: PDF Even though patches are often available, organizations commonly drag their feet—attracting threat actors to exploit unpatched installations. This ebook looks at WhiteHat Security’s top 10 list of vulnerabilities that surfaced last year. From the ebook: Security vulnerabilities are a reality of working in IT, with tech professionals tasked with ensuring that devices on the network are secured against the latest disclosed flaws. With thousands responsibly disclosed each year—to say nothing of vulnerabilities sold on the Dark Web—the task of maintaining the security integrity of devices and applications running on your network can be daunting. WhiteHat Security recently released its Top 10 Application Security Vulnerabilities of 2018 report, detailing the most common exploits used last year. Most, if not all, of these vulnerabilities are still being exploited in the wild by malicious actors, with some of the vulnerabilities existing as components in software packages you may be unaware you are using. Here are the top 10 app security vulnerabilities to watch out for in the coming year. 1. jQuery File Upload (CVE-2018-9206) Though the jQuery File Upload vulnerability was identified only last year, hackers have used it to implant web shells and commandeer vulnerable servers since at least 2016, researchers at Akamai told our sister site ZDNet. The plugin is the second most-starred jQuery project on GitHub, second only to the jQuery framework itself. 2. Magecart credit card skimming A variety of malicious groups are using Magecart to inject malware into ecommerce sites to steal payment details. Magecart is the key behind the TicketMaster, British Airways, and Newegg breaches, the Shopper Approved ecommerce toolkit, and extensions of ecommerce platform Magento, first reported in 2018, with OXO International disclosing a data breach in January 2019. 3. WordPress Denial of Service (CVE-2018-6989) The ubiquity of WordPress makes the blogging platform a popular target for malicious actors, with this vulnerability allowing unauthenticated users to abuse the load-scripts.php component to request mass quantities of JavaScript files, quickly overloading servers. View this now MORE FROM TECHREPUBLIC * Download Now MIDTERM ELECTIONS 2018: HOW 7 STATES ARE FIGHTING CYBERSECURITY THREATS FROM RUSSIA AND OTHER ATTACKERS (FREE PDF) eBooks · Oct 2018 · Provided by TechRepublic * Download Now HOW TO PROTECT AGAINST 10 COMMON BROWSER THREATS (FREE PDF) eBooks · Oct 2018 · Provided by TechRepublic * Download Now APPLE FILEVAULT 2: TIPS FOR IT PROS (FREE PDF) eBooks · May 2018 · Provided by TechRepublic * View This Now GOOGLE CLOUD PLATFORM: AN INSIDER’S GUIDE (FREE PDF) eBooks · Apr 2019 · Provided by TechRepublic * View This Now SPECIAL REPORT: A GUIDE TO DATA CENTER AUTOMATION (FREE PDF) eBooks · Oct 2018 · Provided by TechRepublic MORE IN SECURITY * Download Now THE 6 BUSINESS AND SECURITY BENEFITS OF ZERO TRUST (GERMAN) White Papers · Jul 2019 · Provided by Akamai * Download Now BUILD VS. BUY: A GUIDE FOR CUSTOMER IDENTITY AND ACCESS MANAGEMENT (GERMAN) White Papers · Jul 2019 · Provided by Akamai * Download Now SCALING IDENTITY MANAGEMENT TO ENSURE CUSTOMER LOYALTY PROGRAM SUCCESS: FOUR CASE STUDIES (GERMAN) White Papers · Jul 2019 · Provided by Akamai * Download Now FORRESTER REPORT - GAUGE YOUR DATA PRIVACY & SECURITY MATURITY (GERMAN) White Papers · Jul 2019 · Provided by Akamai * Download Now A GUIDE FOR CUSTOMER IDENTITY AND ACCESS MANAGEMENT - BUILD VS. BUY White Papers · Jul 2019 · Provided by Akamai RECOMMENDED FOR YOU * Download Now ENFORCE A ZERO TRUST SECURITY MODEL IN TODAY'S HOSTILE ENVIRONMENT (GERMAN) White Papers · Jul 2019 · Provided by Akamai * Download Now THE 4 BENEFITS OF VPN ELIMINATION (GERMAN) White Papers · Jul 2019 · Provided by Akamai * Download Now FORRESTER REPORT: BUILDING A CUSTOMER-OBSESSED IAM TEAM (GERMAN) White Papers · Jul 2019 · Provided by Akamai * Download Now THE 4 BENEFITS OF VPN ELIMINATION White Papers · Jul 2019 · Provided by Akamai * Download Now INCIDENT RESPONSE POLICY Tools & Templates · Dec 2017 · Provided by TechRepublic Premium Search FIND BY TOPIC * Big Data * Cloud * Collaboration * Data Centers * Data Management * E-Commerce * Hardware * Innovation * Mobility * Networking * Project Management * Security * Software * Storage * Virtualization * More TopicsAndroidAppleAustraliaBankingConsumerizationCXODeveloperGoogleMicrosoftOpen SourcePrintersSMBsSocial EnterpriseStart-UpsTech & WorkTech Industry by Taboolaby Taboola Sponsored LinksSponsored Links Promoted LinksPromoted Links Recommended Trendchaser 13 der schönsten weiblichen MilliardäreTrendchaser Undo Post Fun Die talentiertesten Bassisten der GeschichtePost Fun Undo FID Verlag Abonnement Fit zu Hause – Diese 7 Übungen sind genialFID Verlag Abonnement Undo How Linux took over everything, including Microsoft Azure Undo The 10 most in-demand programming languages for developers at top companies Undo Programming languages: Which was most popular each year? Undo WHITE PAPERS, WEBCASTS, AND DOWNLOADS * QUICK GLOSSARY: ENCRYPTION Tools & Templates from TechRepublic Premium Download Now * WINDOWS XP: FIREWALLS eBooks from TechRepublic Premium Download Now * IT EMAIL TEMPLATES: SECURITY ALERTS Tools & Templates from TechRepublic Premium Download Now * IT LEADER’S GUIDE TO BIG DATA SECURITY eBooks from TechRepublic Premium Download Now * LUNCH AND LEARN: DEALING WITH THE RISKS OF IDENTITY THEFT Downloads from TechRepublic Premium Download Now Sponsored Links Sponsored Links Promoted Links Promoted Links Recommended Trendchaser 13 der schönsten weiblichen MilliardäreTrendchaser Undo Post Fun Die talentiertesten Bassisten der GeschichtePost Fun Undo How Linux took over everything, including Microsoft Azure Undo The 10 most in-demand programming languages for developers at top companies Undo by Taboola by Taboola Business continuity policy Quick glossary: Vendor contract terminology Virtualization policy 2020 IT budget research report: Security, cloud services, and digitalization are top budget priorities SERVICES * About Us * Manage Profile * Membership * Newsletters * RSS Feeds * Site Map * Site Help & Feedback * FAQ * Advertise * Reprint Policy * TR Premium Terms of Service EXPLORE * Blogs * Downloads * TechRepublic Forums * Meet the Team * TechRepublic Academy * TechRepublic Premium * Resource Library * Photos * Videos © 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Terms of Use | Mobile User Agreement A ZDNet site | Visit other CBS Interactive sites: Select SiteCBS CaresCBS FilmsCBS RadioCBS.comCBS InteractiveCBSNews.comCBSSports.comChowhoundClickerCNETCollege NetworkGameSpotLast.fmMaxPrepsMetacritic.comMoneywatchmySimonRadio.comSearch.comShopper.comShowtimeTechRepublicThe InsiderTV.comUrbanBaby.comZDNet We and our partners use cookies to understand how you use our site, improve your experience and serve you personalized content and advertising. Read about how we use cookies in our cookie policy and how you can control them by clicking "Manage Settings". By continuing to use this site, you accept these cookies. AgreeManage Settings