vulnerabilities

Access Control Vulnerabilities

This blog aims to understand and demonstrate different access control vulnerabilities. The flow here will start with the theoretical explanation…

2 years ago

HTTP Request Smuggling

What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one…

3 years ago