APEX Blog: Vulnerabilities

-->

Latest Posts

The Forms Roadmap in 2021

Find out how we can help you migrate your Oracle Forms applications to Oracle APEX with our award winning application development and consultancy services. There have been minimal..

Read More

Oracle Forms: Where Are We Now?

Find out how we can help you migrate your Oracle Forms applications to Oracle APEX with our award winning   application development and consultancy services. Last year I wrote a..

Read More

Developing Secure Web Applications with APEX and ApexSec

A very common question asked is ‘Is APEX Secure?’ and Joel Kallman from Oracle addressed this topic here, the post is a few years old now but it still applies today. There are two..

Read More

Maximising Sub Regions in Internet Explorer

There have been a few small issues running APEX 5 applications in Internet Explorer since the initial release last year, but most of these have been ironed out in subsequent..

Read More

Securing Vulnerability Exploits with Apex – Part 3

For my final security blog I will be looking at SQL injection and cross site scripting, both of which should always be considered when developing a web based application. Apex has..

Read More

Securing Vulnerability Exploits with Apex – Part 2

Following on from my last blog, which focused on configuring access control within Apex, the focus of this blog is protecting the session state within an application. We will look..

Read More