Return to Article Details Analysis of attacks on vulnerabilities of web-resources Download Download PDF