Finding Vulnerability (XSS), (SQLi) of Web Application

  • Unique Paper ID: 195434
  • PageNo: 72-76
  • Abstract:
  • Web application security is a matter of concern which is critical to the current digital infrastructure because the introduction of web-based services has also augmented the platform of attack by irresponsible individuals as well. They are commonly present in the Cross-site Scripting (XSS) and SQL Injection (SQLi) that are not ranked on the list of the Top 10 vulnerabilities of the Open Web Application Security Project (OWASP). This paper represents the systematic approach in the display of a mechanism on the notification of models and mitigation models of the XSS and SQLi vulnerabilities. Such attacks have life-cycle analysis that determines the functional paradigms that can be used by the threat agents to compromise the conventional security frontiers. It is also possible to observe the usefulness of the provided tools of detection like Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST) and creation of machine learning algorithms to identify the anomalies. We have shown, defense in depth strategy (i.e. having a strict input validation, giving context sensitive output encoding, executing parameterized database queries, automatic run time monitoring, etc. to name a few) can do a fair share in downplaying vulnerability of the web application. The paper will be worked on the synthesis of all the knowledge existing in a mere model of the security that might be adopted by the developer with a specific attention to the practices of the secure coding and the active practice of vulnerability management.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{195434,
        author = {P.Teja},
        title = {Finding Vulnerability (XSS), (SQLi) of Web Application},
        journal = {International Journal of Innovative Research in Technology},
        year = {2026},
        volume = {12},
        number = {11},
        pages = {72-76},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=195434},
        abstract = {Web application security is a matter of concern which is critical to the current digital infrastructure because the introduction of web-based services has also augmented the platform of attack by irresponsible individuals as well. They are commonly present in the Cross-site Scripting (XSS) and SQL Injection (SQLi) that are not ranked on the list of the Top 10 vulnerabilities of the Open Web Application Security Project (OWASP). This paper represents the systematic approach in the display of a mechanism on the notification of models and mitigation models of the XSS and SQLi vulnerabilities. Such attacks have life-cycle analysis that determines the functional paradigms that can be used by the threat agents to compromise the conventional security frontiers. It is also possible to observe the usefulness of the provided tools of detection like Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST) and creation of machine learning algorithms to identify the anomalies. We have shown, defense in depth strategy (i.e. having a strict input validation, giving context sensitive output encoding, executing parameterized database queries, automatic run time monitoring, etc. to name a few) can do a fair share in downplaying vulnerability of the web application. The paper will be worked on the synthesis of all the knowledge existing in a mere model of the security that might be adopted by the developer with a specific attention to the practices of the secure coding and the active practice of vulnerability management.},
        keywords = {Web Application Security, Cross-site Scripting SQL Injection Vulnerability Detection Cybersecurity, OWASP, Defense-in-Depth.},
        month = {March},
        }

Cite This Article

P.Teja, (2026). Finding Vulnerability (XSS), (SQLi) of Web Application. International Journal of Innovative Research in Technology (IJIRT), 12(11), 72–76.

Related Articles