Sponsored By

Slide Show: The Vulnerability 'Usual Suspects' Of 2012

Here's the list of applications, companies, and targets that dominated vulnerability and exploit headlines in 2012

Dark Reading Staff

November 16, 2012

10 Slides


Ask most security experts out there about the most effective vulnerability to target on the Web and they'll inevitably answer, "SQL injection." Organizations like the state of South Carolina and Adobe are just the tip of the iceberg when it comes to victims of SQLi attacks against internal apps in 2012+. It is no surprise, considering results from a Veracode study this year that showed that 84 percent of Web applications from public companies failed to pass initial testing against OWASP Top 10 vulnerabilities parameters. And hackers know it--they're using automated tools like Havij to make the most of these vulnerabilities.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights