Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{149713,
author = {Monika A. Solanki and Dr. Ravi Sheth},
title = {Detection of Security Vulnerabilities in Web Application using Security Headers in Python},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {7},
number = {1},
pages = {435-438},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=149713},
abstract = {A security breach is an early-phase breach that can lead to things like system damage, data loss and many more. As security breaches happened, new security patches were created and bolted on. What is vulnerable, needs to be patched. For HTTP, enter HTTP Security Headers. There’s a lot of aspects to observe when looking for secure a site, and HTTP security headers are a good place to start. Keeping up with HTTP security headers best practices provide another security layer on top of your web applications. Different types of security headers are used for that. We can use these headers to outline communication and improve security of web applications. We can also write the python script to check which HTTP security headers are implemented by web application. And can fetch the value of the header, from the value of these headers we can conclude that the web application is vulnerable or not.},
keywords = {HTTP response header, HTTP Security Headers, Security Testing, Vulnerability Assessment},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry