wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Some web vulnerabilities

profile
swap day
Oct 20, 2021
1 Like
0 Discussions
73 Reads

Internet is very vast and it connects world together.People like to use website and apps.For using most websites or apps we have to proveide our information.When that websites or apps are hacked and data is breached that time users data is not safe. Sometime web or apps need sensitive data like credit card details etc.By exploiting vulnerabilities Hacker can steal data, redirect users etc.

Xss is most common and exploitation results into session hijacking, access browser data etc.

SQL injection also known as sqli and it is most commonly used backend language for storing data.Hacker can gain full access of website or app by using this vulnerability.

Oauth is basically while using different applications or website for sign up or registration we have to give our other information like email id , Facebook credentials etc.

Insecure direct object reference is very critical for e-commerce ,social media etc.Here users supplied input direct takes as object reference.Hacker can aggressively hack data by developing script that takes data of all users.

So security is priority for all organization.Coders have to code well . Organization have to organise event for vulnerability findings.


Comments ()


Sign in

Read Next

Steganography

Blog banner

Busted : Common Web Security Myths

Blog banner

Types Of scheduling

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Answer

Blog banner

The most common internet security threats

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Memory Management

Blog banner

The seven-step improvement process

Blog banner

The Laws of Karma

Blog banner

E-learning

Blog banner

What is Virtual Memory

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

5 People who claimed to have Time Traveled

Blog banner

File Management In OS

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Google classroom

Blog banner

The Peephole

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Understanding - Proof of Work!

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Bharat Maps

Blog banner

Risk management in IT

Blog banner

Wreck

Blog banner

Virtual Memory

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Virtual Machine

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

What is Email? Uses of Emails

Blog banner

Deadlock in Operating systems

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Getting into anime My anime suggestions

Blog banner

Working with AES cryptographic algorithm using crypto++

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Deadlock and starvation in operating system

Blog banner

CONCURRENCY

Blog banner

Landslide Hazard

Blog banner

Data Structures

Blog banner

Blog name

Blog banner

Studying ProRat

Blog banner