Skip to content

Tag Archives: vulnerability

In this article, we will understand one of the types of Cross-Site Scripting in-depth, i.e. Stored XSS. What is Stored Cross-Site Scripting? Stored Cross-Site Scripting… Read More
 Blind XSS Vulnerability Blind XSS is quite similar to stored Cross-Site Scripting attack where the input provided by the attacker is saved or stored by… Read More
In this article, we will discuss the overview of the Open Vulnerability Assessment System (Open VAS) and will also cover its working, and its features,… Read More
In this article, we will be understanding one of the types of Cross-Site Scripting in-depth i.e DOM-based XSS. Let’s discuss it one by one as… Read More
Race condition occurs when multiple threads read and write the same variable i.e. they have access to some shared data and they try to change… Read More
The CTF or Check the Flag problem is posted on vulunhub.com. VulunHub is a platform that provides vulnerable applications/machines to gain practical hands-on experience in… Read More
PrintDemon is a vulnerability striking Windows system. The vulnerability was identified in the Windows Print Spooler. The vulnerability was first discovered and reported by two… Read More
Vulnerabilities are weaknesses in a system that gives threats the opportunity to compromise assets. All systems have vulnerabilities. Even though the technologies are improving but… Read More
Sybil Attack is a type of attack seen in peer-to-peer networks in which a node in the network operates multiple identities actively at the same… Read More
CORS (Cross-Origin Resource Sharing) is a mechanism by which data or any other resource of a site could be shared intentionally to a third party… Read More
Log Injection is a very simple to carry out attack aimed at web applications. For the attacker its very simple to perform the attack. However,… Read More
Many web applications allows users to submit files in a compressed format (usually zip file format) to reduce the size of the file that is… Read More
Prerequisite – Threat Modelling DFD based Threat Modelling is one of the method to visually represent the system being modelled with other being Process Diagram… Read More
What is Spectre security vulnerability? Spectre is a security vulnerability that affects all modern processors that use mechanisms such as branch prediction and speculative action.… Read More
What is Meltdown security vulnerability? Meltdown, also known as Rogue Data Cache Load, is a security vulnerability that affects microprocessors of the types Intel x86,… Read More