The OWASP Top Ten and ESAPI – Part 3 – Malicious File Execution
Tweet This article will describe how to protect your J2EE application from malicious file execution attacks using ESAPI. As with all of the detail articles in this series, if you need a refresher on OWASP or ESAPI, please see the intro article The OWASP Top Ten and ESAPI. What’s the problem? So what exactly is […]