Vulnerability Disclosure

NoSQL Injection Vulnerability

In this blog, we will be discussing the NoSQL Injection Vulnerability and its exploitations scenarios. Before getting into the details…

2 years ago

SECOND ORDER SQL INJECTION ATTACK

Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know…

3 years ago

Open Redirect

What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes…

3 years ago

CRLF Injection

Before going into details on what and how to find and perform CRLF injection and what are the measure one…

3 years ago

HTTP Parameter Pollution

The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to…

3 years ago

Web Cache Poisoning – Through Host Header Injection

Web cache poisoning is an advanced hacking technique through which an attacker can exploit the pattern or behavior of a…

3 years ago

Apache Struts-2 Exploited to Remote Code Execution

This blog is to describe my finding on a web-based application which is a very well-known vulnerability found on Apache…

3 years ago

Microsoft Zero Day – VCard Vulnerability

In this blog we are going to discuss about Microsoft Zero Day - VCard Vulnerability For Windows operating system. Introduction…

5 years ago

Advisory | Microsoft Zero Day – Windows Task Scheduler Local Privilege Escalation Vulnerability

Introduction to Microsoft Zero Day Vulnerability A previously unknown zero day vulnerability has been disclosed in the Microsoft's Windows operating…

6 years ago