|
You are here |
kersed.net | ||
| | | | |
miparnisariblog.wordpress.com
|
|
| | | | | (The book and the answers to the questions at the end of each chapter.) Phew, this book took forever to finish. This is my attempt to summarise a 900+ page book :) Introduction Vulnerabilities in web apps arise because of one core problem: users can submit arbitrary input. Apps make themselves vulnerable by transmitting data... | |
| | | | |
www.nodejs-security.com
|
|
| | | | | The MCP Database Server by ExecuteAutomation had a critical vulnerability that allowed SQL injection attacks, bypassing its "read-only" mode. This article explores the flaw, its exploitation, and mitigation strategies. | |
| | | | |
www.miguelxpn.com
|
|
| | | | | XSS stands for Cross Site Scripting, it's basically when input is not properly sanitized somewhere and a malicious actor can inject unintended javascript somewhere. That javascript will be executed by some unsuspecting user's browser and then bad stuff can happen. | |
| | | | |
shibumi.dev
|
|
| | | How to fix PDF display issues with Chrome | ||