wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Some web vulnerabilities

profile
swap day
Oct 20, 2021
1 Like
0 Discussions
73 Reads

Internet is very vast and it connects world together.People like to use website and apps.For using most websites or apps we have to proveide our information.When that websites or apps are hacked and data is breached that time users data is not safe. Sometime web or apps need sensitive data like credit card details etc.By exploiting vulnerabilities Hacker can steal data, redirect users etc.

Xss is most common and exploitation results into session hijacking, access browser data etc.

SQL injection also known as sqli and it is most commonly used backend language for storing data.Hacker can gain full access of website or app by using this vulnerability.

Oauth is basically while using different applications or website for sign up or registration we have to give our other information like email id , Facebook credentials etc.

Insecure direct object reference is very critical for e-commerce ,social media etc.Here users supplied input direct takes as object reference.Hacker can aggressively hack data by developing script that takes data of all users.

So security is priority for all organization.Coders have to code well . Organization have to organise event for vulnerability findings.


Comments ()


Sign in

Read Next

Open Source Project By Google

Blog banner

Why we fail after giving 100% ?

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Major achievement

Blog banner

Deadlocks in operating system

Blog banner

Functions of Operating System

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Deadlock and Starvation

Blog banner

american greatines

Blog banner

What is Email? Uses of Emails

Blog banner

I/O Management and Disk Scheduling

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Earth with no trees

Blog banner

All you need to know about “On-page SEO”

Blog banner

Process states

Blog banner

objectives and function of operating system

Blog banner

Modern Operating Systems

Blog banner

Scheduling

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Domain Name System

Blog banner

How to lose belly fat

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

To-Do List In LISP

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Email Privacy

Blog banner

VPN

Blog banner

Visualization in Data Science

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Deadlock and Starvation

Blog banner

"Mahakali cave"

Blog banner

Defining youtubr

Blog banner

Malware Defense

Blog banner

Cyber Security in Data Breaching

Blog banner

Threading

Blog banner

Note on Process, Process creation and Process termination

Blog banner

What are Tenders its various types

Blog banner

KAHAWA TEA

Blog banner