wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Some web vulnerabilities

profile
swap day
Oct 20, 2021
1 Like
0 Discussions
73 Reads

Internet is very vast and it connects world together.People like to use website and apps.For using most websites or apps we have to proveide our information.When that websites or apps are hacked and data is breached that time users data is not safe. Sometime web or apps need sensitive data like credit card details etc.By exploiting vulnerabilities Hacker can steal data, redirect users etc.

Xss is most common and exploitation results into session hijacking, access browser data etc.

SQL injection also known as sqli and it is most commonly used backend language for storing data.Hacker can gain full access of website or app by using this vulnerability.

Oauth is basically while using different applications or website for sign up or registration we have to give our other information like email id , Facebook credentials etc.

Insecure direct object reference is very critical for e-commerce ,social media etc.Here users supplied input direct takes as object reference.Hacker can aggressively hack data by developing script that takes data of all users.

So security is priority for all organization.Coders have to code well . Organization have to organise event for vulnerability findings.


Comments ()


Sign in

Read Next

The Art Of Getting What You Want In Life....

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Jira Software

Blog banner

Memory management and virtual memory

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Memory Management

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Operating system

Blog banner

Cryptanalysis tool

Blog banner

Principles of Concurrency

Blog banner

Tracking Emails & Email Crimes

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Memory Management in Operating System

Blog banner

Deadlocks

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Electronic Funds Transfer

Blog banner

Recipe of Paneer Butter Masala

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Why is online marketing is important in current scenario

Blog banner

GraphQL

Blog banner

Cyber Security Standards

Blog banner

Deadlock

Blog banner

Smartsheet

Blog banner

What is E-commerce

Blog banner

Memory heirachy (Operating system)

Blog banner

Harsh Rathod

Blog banner

Operating system and overviews

Blog banner

SQL Injection

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Memory managment

Blog banner

Virtual memory in os

Blog banner

Disk Management

Blog banner

Memory Management

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Number Guessing game --lisp

Blog banner

Buffer overflow

Blog banner

Evolution of Operating Sytems

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner