Open Access Open Access  Restricted Access Subscription Access

A Review on Web Application with Vulnerabilities Protection

Narendra M Kandoi, Dr. Vilas M Thakare


Abstract Web application vulnerabilities as easy to misuse Vulnerable Web applications not only put network frameworks and devices at substantially more greater risk, they likewise offer an immediate channel to confidential customer data, for example, credit card numbers, account history and health records, and also to corporate data. The security requirements of web applications by giving an analysis of the objects, principals and the features of present day web applications. Web programs keep up perusing history and went to interface data for each perusing session with a site. Web mashups comprise of a hosting page, as a rule called the integrator, and various outsider segments frequently called gadgets, gadgets, blocks, or pipes. Most web applications are custom made and, along, these lines incorporate, a lesser level of testing than off-the-shelf programming. This system depends on chance analysis and mashup source gathering that will investigate and evaluate the data transitions between the server-side and the client side. In this way, custom applications are more powerless to attack.

Keywords: Web Mashup, web programs, application, protection, security models.

Cite this Article

Narendra M Kandoi, Vilas M Thakare. A Review on Web Application with Vulnerabilities Protection. Journal of Multimedia Technology & Recent Advancements. 2017; 4(3): 31–38p.

Full Text:



  • There are currently no refbacks.

This site has been shifted to