wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Some web vulnerabilities

profile
swap day
Oct 20, 2021
1 Like
0 Discussions
73 Reads

Internet is very vast and it connects world together.People like to use website and apps.For using most websites or apps we have to proveide our information.When that websites or apps are hacked and data is breached that time users data is not safe. Sometime web or apps need sensitive data like credit card details etc.By exploiting vulnerabilities Hacker can steal data, redirect users etc.

Xss is most common and exploitation results into session hijacking, access browser data etc.

SQL injection also known as sqli and it is most commonly used backend language for storing data.Hacker can gain full access of website or app by using this vulnerability.

Oauth is basically while using different applications or website for sign up or registration we have to give our other information like email id , Facebook credentials etc.

Insecure direct object reference is very critical for e-commerce ,social media etc.Here users supplied input direct takes as object reference.Hacker can aggressively hack data by developing script that takes data of all users.

So security is priority for all organization.Coders have to code well . Organization have to organise event for vulnerability findings.


Comments ()


Sign in

Read Next

WORKFRONT SOFTWARE

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Memory Management

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Introduction my self

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Rain

Blog banner

Principal of concurrency

Blog banner

What is M-commerce and how it's work

Blog banner

undefined

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Steganography and Steganalysis

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Intrusion Detection System

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Operating System

Blog banner

Be you

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Network Security Risks

Blog banner

De-Coding Love

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

OLA

Blog banner

File management In Operating System

Blog banner

Process and Threading

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

This is my first blog.

Blog banner

Cryptanalysis tool

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Social engineering in cyber security

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

RAID

Blog banner

Virtual Machine

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Security requirements for Safe E-Payments

Blog banner

SMARTSHEET

Blog banner

Webmail

Blog banner

How to lose belly fat

Blog banner

Indian Culture and Tradition

Blog banner

Virtual Machine

Blog banner