This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
University for Business Engineering and Management , Banja Luka , Bosnia and Herzegovina
Bank of Moscow Belgrade , Belgrade , Serbia
The enormous popularity of the Internet is continually opening new possibilities of its use for private and business purposes. On the other side, such a huge presence on the Internet and big number of web applications has also attracted those who, in various ways, want to crack the security and exploit weaknesses of the web application security. This paper is aimed at presenting the most commonly identified weaknesses of web applications, describing ways in which these weaknesses can be misused and risks they imply, as well as all the recommendations on how to prevent them. Here we also presented data from literature related to the study of web applications vulnerability by regions. Given results and overviews should help everyone involved in web application creation and maintenance to identify potential vulnerabilities on time and to anticipate and apply all the necessary technical and organizational measures in order to prevent potential losses that may occur as a result of violating the web application security.
WEB applications, Security risks, vulnerabilities, Authentication, Session management, XSS, Code injection
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.