OWASP Top 10 - A6 Sensitive Data Exposure
Description We have seen in the previous articles that an experienced attacker can easily intercept…
OWASP Top 10 - A5 Security Misconfiguration
Description Nowadays, besides the operating system and the JRE, most of the Java applications are…
OWASP Top 10 - A4 Insecure Direct Object References
Description The application exposes a direct reference (functional identifier, database key, file path…) to a…
OWASP Top 10 - A3 Cross Site Scripting (XSS)
Description Cross-Site Scripting is a specific consequence of an injection attack. The goal is to…
OWASP Top 10 - A2 Broken Authentication and Session Management
Description The attacker steals his victim’s credentials or any information that will help him…
Description The attacker sends untrusted data that will be injected in the targeted application to…
When starting a new web application, the security risks are sadly often underestimated by everyone…
Improving the performance of the Spring-Petclinic sample application (part 5 of 5)
This is part 5 of our 5-part series on improving the performance of the Spring-petclinic…
Improving the performance of the Spring-Petclinic sample application (part 4 of 5)
This is part 4 of our 5-part series on improving the performance of the Spring-petclinic…
Improving the performance of the Spring-Petclinic sample application (part 3 of 5)
This is part 3 of our 5-part series on improving the performance of the Spring-petclinic…
Improving the performance of the Spring-Petclinic sample application (part 2 of 5)
This is part 2 of our 5-part series on improving the performance of the Spring-petclinic…
Improving the performance of the Spring-Petclinic sample application (part 1 of 5)
This post is a performance audit of the “spring-petclinic” sample application [https://github.com/SpringSource/…