wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Some web vulnerabilities

profile
swap day
Oct 20, 2021
1 Like
0 Discussions
73 Reads

Internet is very vast and it connects world together.People like to use website and apps.For using most websites or apps we have to proveide our information.When that websites or apps are hacked and data is breached that time users data is not safe. Sometime web or apps need sensitive data like credit card details etc.By exploiting vulnerabilities Hacker can steal data, redirect users etc.

Xss is most common and exploitation results into session hijacking, access browser data etc.

SQL injection also known as sqli and it is most commonly used backend language for storing data.Hacker can gain full access of website or app by using this vulnerability.

Oauth is basically while using different applications or website for sign up or registration we have to give our other information like email id , Facebook credentials etc.

Insecure direct object reference is very critical for e-commerce ,social media etc.Here users supplied input direct takes as object reference.Hacker can aggressively hack data by developing script that takes data of all users.

So security is priority for all organization.Coders have to code well . Organization have to organise event for vulnerability findings.


Comments ()


Sign in

Read Next

Multiprocessor and Multicore Organization

Blog banner

Artificial Intelligence (AI)

Blog banner

GIS Mapping

Blog banner

What is semaphore in operating system?

Blog banner

Health and fitness

Blog banner

Deadlock in Operating systems

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Health and fitness in technology

Blog banner

Social Media Sentiment Analysis

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Memory heirachy (Operating system)

Blog banner

Cybersecurity Standards for Automotive

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

S-Tool : Steganography

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Asana

Blog banner

Digital Forensics Challenges and Tools

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

LINUX

Blog banner

The most common internet security threats

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Evolution of Operating System

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Virtual memory

Blog banner

Secure Hypertext transfer protocol

Blog banner

Threat management

Blog banner

Deadlock

Blog banner

Virtual Machine's

Blog banner

Types of Threads

Blog banner

Virtual memory

Blog banner

Service Transition Process in ITSM

Blog banner

Principal of concurrency

Blog banner

Types of threads

Blog banner

File Sharing

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Major achievement

Blog banner

Os(Computer security threats)

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner