wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Some web vulnerabilities

profile
swap day
Oct 20, 2021
1 Like
0 Discussions
73 Reads

Internet is very vast and it connects world together.People like to use website and apps.For using most websites or apps we have to proveide our information.When that websites or apps are hacked and data is breached that time users data is not safe. Sometime web or apps need sensitive data like credit card details etc.By exploiting vulnerabilities Hacker can steal data, redirect users etc.

Xss is most common and exploitation results into session hijacking, access browser data etc.

SQL injection also known as sqli and it is most commonly used backend language for storing data.Hacker can gain full access of website or app by using this vulnerability.

Oauth is basically while using different applications or website for sign up or registration we have to give our other information like email id , Facebook credentials etc.

Insecure direct object reference is very critical for e-commerce ,social media etc.Here users supplied input direct takes as object reference.Hacker can aggressively hack data by developing script that takes data of all users.

So security is priority for all organization.Coders have to code well . Organization have to organise event for vulnerability findings.


Comments ()


Sign in

Read Next

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Question

Blog banner

Os(Computer security threats)

Blog banner

Mumbai Metro 3

Blog banner

Full Disk Encryption

Blog banner

Evolution of Operating Systems

Blog banner

Memory heirachy (Operating system)

Blog banner

OLA

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Virtualisation

Blog banner

FASHION

Blog banner

Busted : Common Web Security Myths

Blog banner

Memory input output management

Blog banner

Evolution of the Microprocesor

Blog banner

Raid and levels of raid.

Blog banner

Virtual Memory

Blog banner

Hubspot

Blog banner

Smartsheet

Blog banner

Love is in air.....

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Big Data Architecture

Blog banner

Getting into Anime

Blog banner

Session Hijacking

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Computer security techniques

Blog banner

Loneliness

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Memory Management

Blog banner

Understanding Business Layer in Data Science

Blog banner

Decision Tree: A Diagram Model

Blog banner

Privacy LAWs in IT

Blog banner

OPERATING SYSTEM

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Balance

Blog banner

memory cache

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

rupee

Blog banner

Amazon

Blog banner

operating system

Blog banner

Swiggi

Blog banner

MENDELEY

Blog banner