|
You are here |
kersed.net | ||
| | | | |
miparnisariblog.wordpress.com
|
|
| | | | | (The book and the answers to the questions at the end of each chapter.) Phew, this book took forever to finish. This is my attempt to summarise a 900+ page book :) Introduction Vulnerabilities in web apps arise because of one core problem: users can submit arbitrary input. Apps make themselves vulnerable by transmitting data... | |
| | | | |
paragonie.com
|
|
| | | | | Although Cross-Site Scripting is one of the most common vulnerabilities on the Internet, it remains an unsolved problem (unlike SQL Injection). | |
| | | | |
www.nodejs-security.com
|
|
| | | | | The MCP Database Server by ExecuteAutomation had a critical vulnerability that allowed SQL injection attacks, bypassing its "read-only" mode. This article explores the flaw, its exploitation, and mitigation strategies. | |
| | | | |
yieldcode.blog
|
|
| | | During the development of my recent project, I decided to split some components to their own packages, and used npm workspaces for that. | ||