Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
130 Chapter 4 • Vulnerable CGI Scripts
process bids, and process user logons to display a personal Web page of
purchases and items being watched during the bidding process.This is
similar to other sites that use CGI programs to provide shopping carts,
CGI programs that keep track of items a user has selected to buy. Once
the users decide to stop shopping, these customers use another CGI
script to “check out” and purchase the items.
While sites such as eBay and e-commerce sites may use more com-
plex CGI scripts and programs for making transactions, there are also a
number of other common uses for CGI on the Web, including counters,
which show the number ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312