Double trouble – Microsoft ASP .NET and Visual Studio Code affected by HTTP Request Smuggling Vulnerability Analysis — CVE-2025-55315

CVE-2025-55315, report, Microsoft, .Net, ASP, HTTP Request Smuggling, Phoenix Security, Security Advisory

TLDR: What is the impact of CVE-2025-55315

Phoenix Threat Link:

Phoenix AI Threat Intelligence,

https://phoenix.security/cyber-risk-club-resources/blogs/vulnerability-weekly/ 

Executive Summary: HTTP Request Smuggling Vulnerability (CVE-2025-55315) in ASP.NET Core and Visual Studio Code

What Happened:

A critical security vulnerability (CVE-2025-55315) has been identified in Microsoft ASP.NET Core and Visual Studio Code. This flaw, known as HTTP Request Smuggling (CWE-444), allows attackers to bypass security features due to inconsistent interpretation of HTTP requests between different components (e.g., Kestrel server and reverse proxies).

Why It Matters:

This vulnerability has a CVSS score of 9.9 (Critical) and can lead to severe consequences, including:

  • Unauthorized Access: Attackers can bypass authentication and access control mechanisms, potentially logging in as other users or hijacking sessions.
  • Data Exposure and Manipulation: Sensitive information can be viewed, and file contents on target servers can be altered.
  • Internal System Compromise: Attackers can access restricted internal endpoints or services normally inaccessible from the outside.
  • Privilege Escalation: In multi-tenant environments, attackers could cross tenant/session boundaries.

Who is Affected by CVE-2025-55315

  • Applications running ASP.NET Core 10.0 (version 10.0.0-rc.1.25451.107 or earlier), ASP.NET Core 9.0 (version 9.0.9 or earlier), ASP.NET Core 8.0 (version 8.0.20 or earlier), and ASP.NET Core 2.x applications consuming Microsoft.AspNetCore.Server.Kestrel.Core version 2.3.0 or earlier.
  • Environments with internet-exposed Kestrel instances or inconsistently configured reverse proxies (NGINX, IIS, Azure Front Door) are at higher risk.

Immediate Actions Required to fix CVE-2025-55315 (Remediation Guidance):

  1. Patch/Update:
    • .NET 8+: Apply the official .NET update from Microsoft Update and restart applications/reboot.
    • ASP.NET Core 2.3: Update Microsoft.AspNetCore.Server.Kestrel.Core to 2.3.6, recompile, and redeploy.
    • Self-contained applications: Install the runtime update, recompile, and redeploy.
  2. Prioritize: Focus patching and verification on externally reachable Kestrel instances and public APIs.
  3. Mitigations (if patching is delayed):
    • Configure edge proxies/WAFs to reject ambiguous Transfer-Encoding/Content-Length combinations and normalize header parsing.
    • Add WAF rules to block suspicious request framing.
    • Deploy a defending proxy that normalizes request parsing in front of Kestrel.


The issue is where services use the Dot Net base image, that was vulnerable up to the 14th October! Services that are built upon base images such as aspnet:8.0-jammy-chiseled-extra will need rebuilding and deploying to pick up the latest base image with the patch. That makes the remediation particularly tricky as it could mean a lot of services need redeploying.

Neil Reed, Principal AppSec Engineer

Phoenix Security Recommendation:

  • Create a targeted remediation campaign for all affected applications.
  • Prioritize remediation for externally reachable assets or services handling authentication/session management.
  • Utilize Phoenix contextual deduplication to streamline findings.
  • Validate proxy and backend parsing configurations to prevent HTTP desynchronization.

Business Risk:

This vulnerability poses a high business criticality in customer-facing or multi-tenant SaaS environments, especially for web-facing applications using .NET or Visual Studio Code. It could lead to confidentiality breaches affecting regulatory controls like GDPR or SOC 2. Operational impact is moderate, requiring application restarts for remediation.

Overview of CVE-2025-55315 

A security feature bypass vulnerability exists in ASP.NET Core where inconsistent interpretation of HTTP requests between components can enable an attacker to manipulate request parsing logic.

This inconsistency may permit HTTP Request Smuggling (CWE-444), allowing a malicious actor with valid access to interfere with authentication or authorization logic, bypass security controls, and potentially inject or redirect requests across internal trust boundaries.

The flaw impacts environments where Kestrel or reverse proxies process HTTP requests with differing interpretations of headers and payloads.


Why is CVE-2025-55315  potentially bad:

Microsoft evaluated this as a security feature bypass that changes scope. Kestrel parsing differences permit a hidden (smuggled) request to be delivered to application code while the gateway or front-end thinks a different logical request happened. Microsoft scores for worst-case application impact rather than the bare HTTP-parsing primitive. That approach drives the CVSS to 9.9: the vulnerability can change trust boundaries and escalate what an otherwise low-risk primitive could do when combined with vulnerable application logic.

Concrete attacker outcomes (realistic scenarios)

A successful request-smuggling attack does not have a fixed payload type — its impact depends entirely on what the target application does with the smuggled request. Examples observed or plausible:

  • Login-as-another-user (EOP / session confusion). A smuggled request can reuse or hijack an existing session context or cause the server to attach a different authentication token to the hidden request, allowing the attacker to act as another authenticated user.
  • Server-Side Request Forgery (SSRF) / internal request execution. The smuggled request can target internal-only endpoints or metadata services that are normally inaccessible from the outside.
  • CSRF bypass. If an application performs CSRF checks based on one request but the smuggled request is evaluated by application logic without those checks, attacker-controlled actions can succeed.
  • Injection or parameter pollution. Smuggled requests can carry payloads that bypass input validation or reach code paths that were not hardened against untrusted input, enabling SQL/command/in-template injections.
  • Cache poisoning and routing manipulation. Smuggled responses or request routing differences can poison caches or cause privileged responses to be incorrectly cached/delivered.
  • Privilege escalation in multi-tenant apps. In multi-tenant or multi-session environments, the smuggled request can cross tenant/session boundaries, causing data leakage or action execution in the wrong tenant context.

Why some apps are safe and others are dangerously exposed

  • Apps behind gateways/proxies that normalize or strip smuggled content (for example, proxies that reject inconsistent Transfer-Encoding / Content-Length combos) are protected.
  • Apps that perform strict per-request validation (authentication, CSRF, origin checks, token validation) at a single, centralized layer reduce the attack surface.
  • Apps that have ad hoc or per-request state handling (custom auth logic that reads different headers at different stages, or code that trusts raw socket-level details) are at greatest risk.

Probability & conditions that raise risk

  • Internet-exposed endpoints with Kestrel directly reachable or with misconfigured/transparent proxies: High priority.
  • APIs that accept mixed HTTP/1.0/1.1 traffic or rely on non-standard header parsing: elevated risk.
  • Framework-dependent deployments (relying on server runtime) where operator patching lags: higher risk than self-contained apps that can be rebuilt and redeployed quickly.
  • Apps that perform authentication or authorization decisions with partial request context or that accept requests from internal proxies without revalidation: high risk.

Overall exploitability remains constrained by the need for an attacker to craft smuggled requests and, often, to have at least some access (valid session or ability to send network traffic). But where those conditions exist — especially with internet-exposed Kestrel or inconsistent proxy stacks — the potential impact is severe.


CVE-2025-55315 Technical Summary

FieldDetail
VendorMicrosoft
ProductASP.NET Core
ComponentHTTP Request Parsing / Kestrel Server
Weakness (CWE)444 — Inconsistent Interpretation of HTTP Requests
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactLow
CVSS (Base)9.9 (Critical)
CVSS (Temporal)8.6
Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
Exploitability AssessmentExploitation Less Likely
Public ExploitNo
Exploitation in the WildNo

Root Cause

The vulnerability arises from inconsistent parsing and interpretation of HTTP requests between the ASP.NET Core runtime and underlying HTTP server components.

An attacker leveraging malformed HTTP requests can trigger request smuggling, where the front-end and back-end servers process different logical requests, enabling the bypass of certain security features such as input validation, request filtering, or authentication checks.


Impact

A successful exploitation could enable an authorized attacker to:

  • Bypass authentication or access control mechanisms.
  • Manipulate or replay HTTP requests within the same session context.
  • Access restricted endpoints or alter response behavior.
  • In specific configurations, poison intermediary caches or route unauthorized traffic internally.

While exploitation requires valid credentials or access to an authenticated session, the impact on confidentiality and integrity is high, especially in environments processing sensitive or regulated data.


Exploitation Probability

  • Reachability: Limited to authenticated users with network access.
  • Complexity: Low (crafted HTTP requests).
  • Exploit Availability: None public.
  • Phoenix Exploitability Rating: Critical to High on exposed system, Medium to Low probability on other systems

Phoenix Contextual Assessment:

If the application is internet-facing, or reverse proxies (e.g., NGINX, IIS, or Azure Front Door) are inconsistently configured, the probability of exploitability increases.

Within internal services or microservice architectures, risk depends on parsing behavior alignment across layers.

Whilst Bypass has a medium to low probability of exploitation, Input validation has a High probability of ransomware and exploitation

Moreover, being an HTTP-based request, and when in NGINX, IIS, or other web-facing applications, the priority of this vulnerability should be raised 

https://ai-threat.phoenix.security/?layer=enterprise&input=H4sIAAAAAAAAE3MOc9U1MjAy1TU1NTY0BQCGvIV8DgAAAA==


CVE-2025-55315
Vulnerability Vector analysis

[VENDOR] ASP.NET
[PRODUCT] Core
[COMPONENT] http requests
[VERSIONVUL] N/A
[VERSIONFIX] N/A
[WEAKNESS] Inconsistent interpretation of http requests
[ATTACKER] authorized attacker
[IMPACT] bypass a security feature
[VECTOR] over a network
[ROOTCAUSE] Inconsistent interpretation
[VULNERABILITY TYPE] Bypass
[VULNERABILITY IMPACT] Input Validation

Verify in Phoenix Security if your libraries could be affected:

https://YOURPHOENIXDOMAIN/app/external-dependencies/libraries?q=eJyrrgUAAXUA%2BQ%3D%3D

Affected libraries:

  • Microsoft.AspNetCore.Server.Kestrel.Core
  • Microsoft.AspNetCore.Server.IIS
  • Microsoft.AspNetCore.Authentication.JwtBearer”

Verify in Phoenix Security if your software could be affected :

https://YOURDOMAIN/app/external-dependencies/products?q=eJyrrgUAAXUA%2BQ%3D%3D

Search for affected products:

  • asp.net_core
  • visual_studio_2022

ACTION: Campaign Configuration in Phoenix Security 

https://demo2.appsecphx.io/app/security/campaigns


Test the Phoenix Campaign

Get Notified of a hit or update

Verifify the campign is targeting vulnerabilities

Check Vulnerabilities and Impact in Phoenix Security

https://YOURDOMAIN/app/vulnerabilities?q=eJyrVipOTSxKzlCyUnIOc9U1MjAy1TU1NTY0VdJRysksLgmpLEgFyrll5qVk5qUXK9UCAF%2BnDrM%3D


Remediation Guidance

Immediate (apply as soon as possible)

  1. Patch / update runtime and packages
    • For servers running .NET 8+: apply the official .NET update from Microsoft Update and restart apps / reboot as required.
    • For ASP.NET Core 2.3 apps: update Microsoft.AspNet.Server.Kestrel.Core to 2.3.6, recompile and redeploy.
    • For self-contained applications: install the runtime update, recompile the app and redeploy.
  2. Prioritize externally reachable assets
    • Treat externally reachable Kestrel instances and public APIs as highest priority for patching and verification.
  3. If immediate patching is delayed, apply mitigations
    • Configure edge proxies/WAFs to reject requests with ambiguous Transfer-Encoding/Content-Length combinations and to normalize header parsing.
    • Add WAF rules to block suspicious request framing and multiple pipelined requests.
    • Where possible, place a defending proxy that normalizes request parsing in front of Kestrel.
  • Recompile and redeploy.

Phoenix Security Recommendation:

  • Create a targeted remediation campaign scoped to all affected applications using Phoenix Security’s campaign module.
  • Prioritize remediation for externally reachable assets or services handling authentication or session management.
  • Use Phoenix contextual deduplication to eliminate redundant findings across containerized and cloud-deployed workloads.
  • Validate alignment of proxy and backend parsing configurations to prevent HTTP desynchronization.

Business Risk Assessment

  • Potential Impact: Unauthorized access to protected endpoints and data exposure through smuggled requests.
  • Business Criticality: High in customer-facing or multi-tenant SaaS environments web facing application with .NET or VS code users are impacted.
  • Regulatory Relevance: Could lead to confidentiality breaches affecting GDPR or SOC 2 controls.
  • Operational Impact: Moderate — application restarts required for remediation.

Visual Studio 2022 — 17.14 (build 17.14.17) — Release date: 14 Oct 2025

• Release notes / Knowledge Base: Visual Studio 2022 v17.14 release notes.  

https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes

• Download / Security Update (Microsoft Update Catalog entry for 17.14.17).  

https://www.catalog.update.microsoft.com/Search.aspx?q=Visual+Studio+2022+version+17.14.17

Visual Studio 2022 — 17.10 (build 17.10.20) — Release date: 14 Oct 2025

• Release notes / Knowledge Base: Visual Studio 2022 v17.10 release notes.  

https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes-v17.10

• Download / Security Update (Microsoft Update Catalog entry for 17.10.20).  

https://www.catalog.update.microsoft.com/Search.aspx?q=Visual+Studio+2022+version+17.10.20

Visual Studio 2022 — 17.12 (build 17.12.13) — Release date: 14 Oct 2025

• Release notes / Knowledge Base: Visual Studio 2022 release history (includes v17.12).  

https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-history

• Download / Security Update (Microsoft Update Catalog entry for 17.12.13).  

https://www.catalog.update.microsoft.com/Search.aspx?q=Visual+Studio+2022+version+17.12.13

ASP.NET Core 2.3 — Build 2.3.6 — Release date: 14 Oct 2025

• Knowledge Base / Release notes (Kestrel / ASP.NET Core guidance): Kestrel documentation and ASP.NET Core server fundamentals.  

https://learn.microsoft.com/en-us/aspnet/core/fundamentals/servers/kestrel?view=aspnetcore-9.0

https://learn.microsoft.com/en-us/aspnet/core/fundamentals/servers/?view=aspnetcore-9.0

• Download / Package update: NuGet package index for Kestrel core (reference to package family). (Use NuGet to fetch Microsoft.AspNetCore.Server.Kestrel.Core and update to 2.3.6).  

https://www.nuget.org/packages/Microsoft.AspNetCore.Server.Kestrel.Core

ASP.NET Core 9.0 — Build 9.0.10 — Release date: 14 Oct 2025

• Knowledge Base / Release notes: .NET 9.0 download page (includes ASP.NET Core Runtime 9.0.10 and notes).  

https://dotnet.microsoft.com/en-us/download/dotnet/9.0

• Download / Security Update: ASP.NET Core Runtime 9.0.10 (download links & hosting bundle on the .NET download page).  

https://dotnet.microsoft.com/en-us/download/dotnet/9.0

ASP.NET Core 8.0 — Build 8.0.21 — Release date: 14 Oct 2025

• Knowledge Base / Release notes: .NET 8.0 channel / release summary showing 8.0.21 (Runtime 8.0.21) (release date 2025-10-14).  

https://versionsof.net/core/8.0

• Download / Runtime: ASP.NET Core Runtime 8.0.21 (use the .NET downloads page to fetch Runtime/Hosting bundle).  

https://dotnet.microsoft.com/en-us/download/dotnet

Notes & next steps

• The Microsoft Update Catalog entries above are the official packaged updates for Visual Studio — they list the security update packages (search results summarized). Use the Catalog entry pages to download update packages for offline deployment.  

• For ASP.NET Core, use the .NET download pages (links above) to get the ASP.NET Core Runtime/Hosting bundles or SDKs appropriate to your OS and deployment model (framework-dependent vs self-contained).  


References

CWE-444 Definition – MITRE

Get on top of your code and container vulnerabilities with Phoenix Security Actionable ASPM

attack graph phoenix security
ASPM

Organizations often face an overwhelming volume of security alerts, including false positives and duplicate vulnerabilities, which can distract from real threats. Traditional tools may overwhelm engineers with lengthy, misaligned lists that fail to reflect business objectives or the risk tolerance of product owners.

Phoenix Security offers a transformative solution through its Actionable Application Security Posture Management (ASPM), powered by AI-based Contextual Quantitative analysis. This innovative approach correlates runtime data with code analysis to deliver a single, prioritized list of vulnerabilities. This list is tailored to the specific needs of engineering teams and aligns with executive goals, reducing noise and focusing efforts on the most critical issues. Why do people talk about Phoenix

Automated Triage: Phoenix streamlines the triage process using a customizable 4D risk formula, ensuring critical vulnerabilities are addressed promptly by the right teams.

Contextual Deduplication: Utilizing canary token-based traceability, Phoenix accurately deduplicates and tracks vulnerabilities within application code and deployment environments, allowing teams to concentrate on genuine threats.

Actionable Threat Intelligence: Phoenix provides real-time insights into vulnerabilities’ exploitability, combining runtime threat intelligence with application security data for precise risk mitigation.

ASPm, CISA KEV, Remote Code Execution, Inforamtion Leak, Category, Impact, MITRE&ATTACK, AI Assessment, Phoenix CISA KEV, Threat intelligence

By leveraging Phoenix Security, you not only unravel the potential threats but also take a significant stride in vulnerability management, ensuring your application security remains up to date and focuses on the key vulnerabilities.

Get in control of your Application Security posture and Vulnerability management

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Phoenix Security has completed its SOC 2 Type 2 report, reinforcing our ISO 27001 and data privacy commitments. Our Actionable ASPM helps teams cut noise and ship fixes that matter, powered by reachability analysis, contextual deduplication, and human-aligned AI agents. Customers like ClearBank, Bazaarvoice, and Integral Ad Science report double-digit reductions in criticals and massive time savings. If you need verifiable trust and faster remediation across code-to-cloud, Phoenix Security turns risk data into a single, prioritized backlog that engineering actually executes.
Francesco Cipollone
Most enterprises drown in vulnerability data yet starve for attribution. By mapping ownership, location, exposure, and business impact, Phoenix Security’s ASPM turns that swamp into a laser‑focused task list. Only then do three autonomous agents—Researcher, Analyzer, and Remediator—kick in, collaborating to recommend fixes and workflow automation that 10× security‑engineering output. Skip the context and you’ll waste money, requests, tokens, carbon, and human patience on hallucinated advice. For startups, the focus is clear—establish visibility and ensure core security practices are in place. Application Security Posture Management (ASPM) tools provide a straightforward, automated approach to detecting vulnerabilities and enforcing policies. These solutions help reduce risk quickly without overburdening small security teams. Mature organizations, on the other hand, are tackling a different set of problems. With the sheer number of vulnerabilities and an increasingly complicated threat landscape, enterprises need to fine-tune their approach. The goal shifts toward intelligent remediation, leveraging real-time threat intelligence and advanced risk prioritization. ASPM tools at this stage do more than just detect vulnerabilities—they provide context, enable proactive decision-making, and streamline the entire remediation process. The emergence of AI-assisted code generation has further complicated security in both environments. These tools, while speeding up development, are often responsible for introducing new vulnerabilities into applications at a faster pace than traditional methods. The challenge is clear: AI-generated code can hide flaws that are difficult to catch in the rush of innovation. Both startups and enterprises need to adjust their security posture to account for these new risks. ASPM platforms, like Phoenix Security, provide automated scanning of code before it hits production, ensuring that flaws don’t make it past the first line of defense. Meanwhile, organizations are also grappling with the backlog crisis in the National Vulnerability Database (NVD). A staggering number of CVEs remain unprocessed, leaving many businesses with limited data on which to base their patching decisions. While these delays leave companies vulnerable, Phoenix Security steps in by cross-referencing CVE data with known exploits and live threat intelligence, helping organizations stay ahead despite the lag in official vulnerability reporting. Whether just starting their security program or managing a complex infrastructure, organizations need a toolset that adapts with them. Phoenix Security enables businesses of any size to prioritize vulnerabilities based on actual risk, not just theoretical impact, helping security teams navigate the evolving threat landscape with speed and accuracy.
Francesco Cipollone
Shai Hulud weaponised npm’s trust model: stolen maintainer creds, poisoned tarballs, and stealthy GitHub Actions that exfiltrate secrets and persist in CI. 500+ packages were touched in days, starting with @ctrl/tinycolor. This analysis maps the blast radius and delivers a practical remediation plan—pin versions, block direct npm with a proxy, rotate tokens, and strip backdoor workflows—grounded in ASPM and reachability.
Francesco Cipollone
A coordinated npm compromise hit @ctrl/tinycolor and dozens of related packages. The payload auto-trojanizes maintainers’ projects, scans for GitHub/NPM/cloud creds using TruffleHog, plants a backdoor GitHub Actions workflow, and exfiltrates to a webhook. This piece breaks down the attack chain and lays out decisive DevSecOps and ASPM actions to contain and harden.
Francesco Cipollone
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO