wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Some web vulnerabilities

profile
swap day
Oct 20, 2021
1 Like
0 Discussions
73 Reads

Internet is very vast and it connects world together.People like to use website and apps.For using most websites or apps we have to proveide our information.When that websites or apps are hacked and data is breached that time users data is not safe. Sometime web or apps need sensitive data like credit card details etc.By exploiting vulnerabilities Hacker can steal data, redirect users etc.

Xss is most common and exploitation results into session hijacking, access browser data etc.

SQL injection also known as sqli and it is most commonly used backend language for storing data.Hacker can gain full access of website or app by using this vulnerability.

Oauth is basically while using different applications or website for sign up or registration we have to give our other information like email id , Facebook credentials etc.

Insecure direct object reference is very critical for e-commerce ,social media etc.Here users supplied input direct takes as object reference.Hacker can aggressively hack data by developing script that takes data of all users.

So security is priority for all organization.Coders have to code well . Organization have to organise event for vulnerability findings.


Comments ()


Sign in

Read Next

Student Grade Calculator in LISP

Blog banner

Mumbaicha Dabbawalla

Blog banner

Music helps reduce stress

Blog banner

Telegram and it's features

Blog banner

An Overview of Virtual Machines

Blog banner

MYNTRA

Blog banner

What is E-commerce

Blog banner

TAILS OS

Blog banner

Vulnerability Assessment

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Cache Memory

Blog banner

Multiprocessor

Blog banner

What is process

Blog banner

Domain Name System

Blog banner

Memory Management

Blog banner

semaphores in os

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Hubspot

Blog banner

Modern operating system

Blog banner

Virtual memory in os

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

10 Reasons to date your best friend

Blog banner

I/O Management and Disk Scheduling

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Optimization of operating system design

Blog banner

Buffering

Blog banner

1.1 basic elements

Blog banner

Bulk E-mail software

Blog banner

Marvel Cinematic Universe

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

SNAPCHAT

Blog banner

Process Description

Blog banner

Landslide Hazard

Blog banner

IOT- Internet Of Things

Blog banner

How social media affect

Blog banner

Memory Management of Operating System(OS)

Blog banner

12 Principles of Animation

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

Social Media.

Blog banner

VPN

Blog banner

Meshoo

Blog banner