What is XSS (Cross Site Scripting) ? – A Detailed Understanding the Type of...

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable and also it is one of the important...
Unvalidated Redirects and Forwards

OWASP A10-Unvalidated Redirects and Forwards

Web applications often redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers...
A-9 Using Components with known Vulnerabilities

A-9 Using Components with known Vulnerabilities – Every Developers Should aware

Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk is widely spread, Many application...
Cross Site Request Forgery

A8-Cross-Site Request Forgery (CSRF)

Cross Site Request Forgery is one of the most common form of attack by online spammers and scammers. Exploicity of this attack is bit...

A7 Missing Function Level Access Control

Function Level Access Control can be exploited easily, if there is an missing access control on resource control, exploiting the risk is simple as...


Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses


Computer Security