www.techrepublic.com Open in urlscan Pro
2.20.190.228  Public Scan

URL: https://www.techrepublic.com/resource-library/whitepapers/10-dangerous-app-vulnerabilities-to-watch-out-for-free-pdf/?ftag=CM...
Submission: On September 16 via api from US

Form analysis 5 forms found in the DOM

Name: site-search /search/

<form class="site-search" name="site-search" action="/search/">
  <fieldset><input name="q" placeholder="What are you looking for?" type="search" autocomplete="off" title="What are you looking for?" value="" class="smart-search-input smart-search-desktop"><button class="smart-search-button" type="submit"
      data-omniture-track="moduleClick" data-omniture-track-data="{&quot;moduleInfo&quot;: &quot;header-search-overlay&quot;}">
      <a class="search-button">
                            <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 483.083 483.083"><g><g><path d="M332.74,315.35c30.883-33.433,50.15-78.2,50.15-127.5C382.89,84.433,298.74,0,195.04,0S7.19,84.433,7.19,187.85
			S91.34,375.7,195.04,375.7c42.217,0,81.033-13.883,112.483-37.4l139.683,139.683c3.4,3.4,7.65,5.1,11.9,5.1s8.783-1.7,11.9-5.1
			c6.517-6.517,6.517-17.283,0-24.083L332.74,315.35z M41.19,187.85C41.19,103.133,110.04,34,195.04,34
			c84.717,0,153.85,68.85,153.85,153.85S280.04,341.7,195.04,341.7S41.19,272.567,41.19,187.85z"></path></g></g></svg></a>
      <div class="go-button hide">GO</div>
    </button>
  </fieldset>
</form>

Name: site-search /search/

<form class="site-search" name="site-search" action="/search/">
  <fieldset><input name="q" placeholder="What are you looking for?" type="search" autocomplete="off" title="What are you looking for?" value="" class="smart-search-input smart-search-mobile"><button class="smart-search-button" type="submit"
      data-omniture-track="moduleClick" data-omniture-track-data="{&quot;moduleInfo&quot;: &quot;header-search-overlay&quot;}">
      <a class="search-button">
                            <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 483.083 483.083"><g><g><path d="M332.74,315.35c30.883-33.433,50.15-78.2,50.15-127.5C382.89,84.433,298.74,0,195.04,0S7.19,84.433,7.19,187.85
			S91.34,375.7,195.04,375.7c42.217,0,81.033-13.883,112.483-37.4l139.683,139.683c3.4,3.4,7.65,5.1,11.9,5.1s8.783-1.7,11.9-5.1
			c6.517-6.517,6.517-17.283,0-24.083L332.74,315.35z M41.19,187.85C41.19,103.133,110.04,34,195.04,34
			c84.717,0,153.85,68.85,153.85,153.85S280.04,341.7,195.04,341.7S41.19,272.567,41.19,187.85z"></path></g></g></svg></a>
      <div class="go-button hide">GO</div>
    </button>
  </fieldset>
</form>

/resource-library/search/

<form action="/resource-library/search/" data-component="directorySuggestiveSearch">
  <input type="text" value="" placeholder="Search our entire library" name="q" autocomplete="off" id="search-dir-q" onfocus="this.placeholder = ''" onblur="this.placeholder = 'Search our entire library'">
  <div class="suggestion-wrapper">
    <ul class="suggestions"></ul>
  </div>
  <button type="submit" class="directory-search-button" id="directory-search-button">Search <svg width="24" height="24" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg" fill-rule="evenodd" clip-rule="evenodd">
      <path
        d="M15.853 16.56c-1.683 1.517-3.911 2.44-6.353 2.44-5.243 0-9.5-4.257-9.5-9.5s4.257-9.5 9.5-9.5 9.5 4.257 9.5 9.5c0 2.442-.923 4.67-2.44 6.353l7.44 7.44-.707.707-7.44-7.44zm-6.353-15.56c4.691 0 8.5 3.809 8.5 8.5s-3.809 8.5-8.5 8.5-8.5-3.809-8.5-8.5 3.809-8.5 8.5-8.5z">
      </path>
    </svg></button>
</form>

<form name="">
  <select name="topic" onchange="if (this.value) { window.location.href=this.value; }">
    <option selected="" value="">More Topics</option>
    <option value="/resource-library/topic/android/">Android</option>
    <option value="/resource-library/topic/apple/">Apple</option>
    <option value="/resource-library/topic/australia/">Australia</option>
    <option value="/resource-library/topic/banking/">Banking</option>
    <option value="/resource-library/topic/consumerization/">Consumerization</option>
    <option value="/resource-library/topic/cxo/">CXO</option>
    <option value="/resource-library/topic/developer/">Developer</option>
    <option value="/resource-library/topic/google/">Google</option>
    <option value="/resource-library/topic/microsoft/">Microsoft</option>
    <option value="/resource-library/topic/open-source/">Open Source</option>
    <option value="/resource-library/topic/printers/">Printers</option>
    <option value="/resource-library/topic/smbs/">SMBs</option>
    <option value="/resource-library/topic/social-enterprise/">Social Enterprise</option>
    <option value="/resource-library/topic/start-ups/">Start-Ups</option>
    <option value="/resource-library/topic/tech-and-work/">Tech &amp; Work</option>
    <option value="/resource-library/topic/tech-industry/">Tech Industry</option>
  </select>
</form>

<form name="">
  <label for="footer-cbsi-site-links">Visit other CBS Interactive sites:</label>
  <select id="footer-cbsi-site-links" name="target" onchange="if (this.value.indexOf('http') != -1) { window.location.href=this.value; }" title="Visit other CBS Interactive sites" data-omniture-track="moduleClick"
    data-omniture-track-data="{&quot;moduleInfo&quot;: &quot;footer-copyright-links&quot;}">
    <option selected="" value="">Select Site</option>
    <option value="http://www.cbscares.com">CBS Cares</option>
    <option value="http://www.cbsfilms.com">CBS Films</option>
    <option value="http://www.cbsradio.com/streaming/index.html">CBS Radio</option>
    <option value="http://www.cbs.com">CBS.com</option>
    <option value="http://www.cbsinteractive.com">CBS Interactive</option>
    <option value="http://www.cbsnews.com">CBSNews.com</option>
    <option value="http://www.cbssports.com">CBSSports.com</option>
    <option value="http://www.chowhound.com">Chowhound</option>
    <option value="http://www.clicker.com">Clicker</option>
    <option value="https://www.cnet.com">CNET</option>
    <option value="http://collegenetwork.cbssports.com">College Network</option>
    <option value="http://www.gamespot.com">GameSpot</option>
    <option value="http://www.last.fm">Last.fm</option>
    <option value="http://www.maxpreps.com">MaxPreps</option>
    <option value="http://www.metacritic.com">Metacritic.com</option>
    <option value="http://www.cbsnews.com/moneywatch/">Moneywatch</option>
    <option value="http://www.mysimon.com">mySimon</option>
    <option value="http://www.radio.com">Radio.com</option>
    <option value="http://www.search.com">Search.com</option>
    <option value="http://www.shopper.com">Shopper.com</option>
    <option value="http://www.sho.com">Showtime</option>
    <option value="https://www.techrepublic.com">TechRepublic</option>
    <option value="http://www.theinsider.com">The Insider</option>
    <option value="http://www.tv.com">TV.com</option>
    <option value="http://www.urbanbaby.com">UrbanBaby.com</option>
    <option value="http://www.zdnet.com">ZDNet</option>
  </select>
</form>

Text Content

Search
GO



 * IT Policy Downloads
 * 5G
 * Developer
 * Top DaaS providers
 * Security
 * More
   * Excel tips
   * Cloud
   * Big Data
   * Digital Transformation
   * CIO
   * Smart Cities
   * TechRepublic Academy
   * Best VPN Services
   * All Topics
   * Sections:
   * Photos
   * Videos
   * All Writers
   * * Newsletters
     * Forums
     * Resource Library
     * TR Premium
   * Editions: US
     * United States
     * Australia
     * United Kingdom
     * Japan
 * * Newsletters
   * Forums
   * Resource Library
   * TR Premium

 * 
   
   My Profile
    * Preferences
    * Premium
    * Newsletters
    * Community
    * Log Out

 * 
 * Search
   GO
   
   
   
 *    * Topics:
      * IT Policy Downloads
      * 5G
      * Developer
      * Top DaaS providers
      * Security
      * Excel tips
      * Cloud
      * Big Data
      * Digital Transformation
      * CIO
      * Smart Cities
      * TechRepublic Academy
      * Best VPN Services
      * All Topics
   
   * Sections:
   * Photos
   * Videos
   * All Writers
   * * Newsletters
     * Forums
     * Resource Library
     * TR Premium
   * Editions: US
     * United States
     * Australia
     * United Kingdom
     * Japan

 * * 
     
     My Profile
      * Preferences
      * Premium
      * Newsletters
      * Community
      * Log Out


10 DANGEROUS APP VULNERABILITIES TO WATCH OUT FOR (FREE PDF)


View this now
Provided by: TechRepublic
Topic: Security
Format: PDF
Even though patches are often available, organizations commonly drag their
feet—attracting threat actors to exploit unpatched installations. This ebook
looks at WhiteHat Security’s top 10 list of vulnerabilities that surfaced last
year.

From the ebook:

Security vulnerabilities are a reality of working in IT, with tech professionals
tasked with ensuring that devices on the network are secured against the latest
disclosed flaws. With thousands responsibly disclosed each year—to say nothing
of vulnerabilities sold on the Dark Web—the task of maintaining the security
integrity of devices and applications running on your network can be daunting.

WhiteHat Security recently released its Top 10 Application Security
Vulnerabilities of 2018 report, detailing the most common exploits used last
year. Most, if not all, of these vulnerabilities are still being exploited in
the wild by malicious actors, with some of the vulnerabilities existing as
components in software packages you may be unaware you are using.

Here are the top 10 app security vulnerabilities to watch out for in the coming
year.

1. jQuery File Upload (CVE-2018-9206)
Though the jQuery File Upload vulnerability was identified only last year,
hackers have used it to implant web shells and commandeer vulnerable servers
since at least 2016, researchers at Akamai told our sister site ZDNet. The
plugin is the second most-starred jQuery project on GitHub, second only to the
jQuery framework itself.

2. Magecart credit card skimming
A variety of malicious groups are using Magecart to inject malware into
ecommerce sites to steal payment details. Magecart is the key behind the
TicketMaster, British Airways, and Newegg breaches, the Shopper Approved
ecommerce toolkit, and extensions of ecommerce platform Magento, first reported
in 2018, with OXO International disclosing a data breach in January 2019.

3. WordPress Denial of Service (CVE-2018-6989)
The ubiquity of WordPress makes the blogging platform a popular target for
malicious actors, with this vulnerability allowing unauthenticated users to
abuse the load-scripts.php component to request mass quantities of JavaScript
files, quickly overloading servers.
View this now


MORE FROM TECHREPUBLIC

   
 * Download Now
   
   
   MIDTERM ELECTIONS 2018: HOW 7 STATES ARE FIGHTING CYBERSECURITY THREATS FROM
   RUSSIA AND OTHER ATTACKERS (FREE PDF)
   
   eBooks · Oct 2018 · Provided by TechRepublic
   
 * Download Now
   
   
   HOW TO PROTECT AGAINST 10 COMMON BROWSER THREATS (FREE PDF)
   
   eBooks · Oct 2018 · Provided by TechRepublic
   
 * Download Now
   
   
   APPLE FILEVAULT 2: TIPS FOR IT PROS (FREE PDF)
   
   eBooks · May 2018 · Provided by TechRepublic
   
 * View This Now
   
   
   GOOGLE CLOUD PLATFORM: AN INSIDER’S GUIDE (FREE PDF)
   
   eBooks · Apr 2019 · Provided by TechRepublic
   
 * View This Now
   
   
   SPECIAL REPORT: A GUIDE TO DATA CENTER AUTOMATION (FREE PDF)
   
   eBooks · Oct 2018 · Provided by TechRepublic





MORE IN SECURITY

   
 * Download Now
   
   
   THE 6 BUSINESS AND SECURITY BENEFITS OF ZERO TRUST (GERMAN)
   
   White Papers · Jul 2019 · Provided by Akamai
   
 * Download Now
   
   
   BUILD VS. BUY: A GUIDE FOR CUSTOMER IDENTITY AND ACCESS MANAGEMENT (GERMAN)
   
   White Papers · Jul 2019 · Provided by Akamai
   
 * Download Now
   
   
   SCALING IDENTITY MANAGEMENT TO ENSURE CUSTOMER LOYALTY PROGRAM SUCCESS: FOUR
   CASE STUDIES (GERMAN)
   
   White Papers · Jul 2019 · Provided by Akamai
   
 * Download Now
   
   
   FORRESTER REPORT - GAUGE YOUR DATA PRIVACY & SECURITY MATURITY (GERMAN)
   
   White Papers · Jul 2019 · Provided by Akamai
   
 * Download Now
   
   
   A GUIDE FOR CUSTOMER IDENTITY AND ACCESS MANAGEMENT - BUILD VS. BUY
   
   White Papers · Jul 2019 · Provided by Akamai





RECOMMENDED FOR YOU

   
 * Download Now
   
   
   ENFORCE A ZERO TRUST SECURITY MODEL IN TODAY'S HOSTILE ENVIRONMENT (GERMAN)
   
   White Papers · Jul 2019 · Provided by Akamai
   
 * Download Now
   
   
   THE 4 BENEFITS OF VPN ELIMINATION (GERMAN)
   
   White Papers · Jul 2019 · Provided by Akamai
   
 * Download Now
   
   
   FORRESTER REPORT: BUILDING A CUSTOMER-OBSESSED IAM TEAM (GERMAN)
   
   White Papers · Jul 2019 · Provided by Akamai
   
 * Download Now
   
   
   THE 4 BENEFITS OF VPN ELIMINATION
   
   White Papers · Jul 2019 · Provided by Akamai
   
 * Download Now
   
   
   INCIDENT RESPONSE POLICY
   
   Tools & Templates · Dec 2017 · Provided by TechRepublic Premium




Search


FIND BY TOPIC

 * Big Data
 * Cloud
 * Collaboration
 * Data Centers
 * Data Management
 * E-Commerce
 * Hardware
 * Innovation
 * Mobility
 * Networking
 * Project Management
 * Security
 * Software
 * Storage
 * Virtualization
 * More
   TopicsAndroidAppleAustraliaBankingConsumerizationCXODeveloperGoogleMicrosoftOpen
   SourcePrintersSMBsSocial EnterpriseStart-UpsTech & WorkTech Industry

by Taboolaby Taboola
Sponsored LinksSponsored Links
Promoted LinksPromoted Links
Recommended
Trendchaser

13 der schönsten weiblichen MilliardäreTrendchaser


Undo
Post Fun

Die talentiertesten Bassisten der GeschichtePost Fun


Undo
FID Verlag Abonnement

Fit zu Hause – Diese 7 Übungen sind genialFID Verlag Abonnement


Undo

How Linux took over everything, including Microsoft Azure


Undo

The 10 most in-demand programming languages for developers at top companies


Undo

Programming languages: Which was most popular each year?


Undo



WHITE PAPERS, WEBCASTS, AND DOWNLOADS

   


 * QUICK GLOSSARY: ENCRYPTION
   
   Tools & Templates from TechRepublic Premium
   
   Download Now
   


 * WINDOWS XP: FIREWALLS
   
   eBooks from TechRepublic Premium
   
   Download Now
   


 * IT EMAIL TEMPLATES: SECURITY ALERTS
   
   Tools & Templates from TechRepublic Premium
   
   Download Now
   


 * IT LEADER’S GUIDE TO BIG DATA SECURITY
   
   eBooks from TechRepublic Premium
   
   Download Now
   


 * LUNCH AND LEARN: DEALING WITH THE RISKS OF IDENTITY THEFT
   
   Downloads from TechRepublic Premium
   
   Download Now


Sponsored Links Sponsored Links 
Promoted Links Promoted Links 
Recommended
Trendchaser

13 der schönsten weiblichen MilliardäreTrendchaser


Undo
Post Fun

Die talentiertesten Bassisten der GeschichtePost Fun


Undo

How Linux took over everything, including Microsoft Azure


Undo

The 10 most in-demand programming languages for developers at top companies


Undo
    
by Taboola by Taboola 




Business continuity policy

Quick glossary: Vendor contract terminology

Virtualization policy

2020 IT budget research report: Security, cloud services, and digitalization are
top budget priorities


SERVICES

 * About Us
 * Manage Profile
 * Membership
 * Newsletters
 * RSS Feeds
 * Site Map

 * Site Help & Feedback
 * FAQ
 * Advertise
 * Reprint Policy
 * TR Premium Terms of Service


EXPLORE

 * Blogs
 * Downloads
 * TechRepublic Forums
 * Meet the Team
 * TechRepublic Academy

 * TechRepublic Premium
 * Resource Library
 * Photos
 * Videos

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad
Choice | Terms of Use | Mobile User Agreement
A ZDNet site |
Visit other CBS Interactive sites: Select SiteCBS CaresCBS FilmsCBS
RadioCBS.comCBS InteractiveCBSNews.comCBSSports.comChowhoundClickerCNETCollege
NetworkGameSpotLast.fmMaxPrepsMetacritic.comMoneywatchmySimonRadio.comSearch.comShopper.comShowtimeTechRepublicThe
InsiderTV.comUrbanBaby.comZDNet
We and our partners use cookies to understand how you use our site, improve your
experience and serve you personalized content and advertising. Read about how we
use cookies in our cookie policy and how you can control them by clicking
"Manage Settings". By continuing to use this site, you accept these cookies.
AgreeManage Settings