In this blog, we will be discussing the NoSQL Injection Vulnerability and its exploitations scenarios. Before getting into the details…
Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know…
What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes…
Before going into details on what and how to find and perform CRLF injection and what are the measure one…
The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to…
Web cache poisoning is an advanced hacking technique through which an attacker can exploit the pattern or behavior of a…
This blog is to describe my finding on a web-based application which is a very well-known vulnerability found on Apache…
In this blog, we are going to discuss about what is the SAML (Security Assertion Markup Language) and how it…
In this blog we are going to discuss about Microsoft Zero Day - VCard Vulnerability For Windows operating system. Introduction…
Introduction to Microsoft Zero Day Vulnerability A previously unknown zero day vulnerability has been disclosed in the Microsoft's Windows operating…