SQL Injection
Types of SQL Injection 1. In-band SQLi Error-based: Forces database to generate error messages revealing information about the database structure ' OR 1=1 -- - ' OR '1'='1' -- - ') OR ('1'=...
Types of SQL Injection 1. In-band SQLi Error-based: Forces database to generate error messages revealing information about the database structure ' OR 1=1 -- - ' OR '1'='1' -- - ') OR ('1'=...
Introduction to SSRF Server-Side Request Forgery (SSRF) is a web security vulnerability that allows attackers to induce the server-side application to make requests to an unintended location. By e...
Introduction Race conditions are security vulnerabilities that occur when the timing of events affects the correct operation of a system or application. They happen when multiple processes or thre...
Introduction NoSQL injection is a security vulnerability that occurs when untrusted data is sent to a NoSQL database interpreter as part of a command or query. Unlike SQL injection, NoSQL injectio...
Introduction Server-Side Template Injection (SSTI) is a vulnerability that occurs when user input is embedded directly into a template in an unsafe manner. When a web application fails to properly...
Introduction Log poisoning is an attack technique where malicious code is injected into server log files which are then executed when the log file is viewed or processed. Log poisoning via User-Ag...
Introduction Local File Inclusion (LFI) LFI vulnerabilities allow an attacker to include files on a server through the web browser. This vulnerability occurs when a web application includes a file...
Introduction Insecure Direct Object References (IDOR) is a critical web security vulnerability that occurs when an application exposes a reference to an internal implementation object, such as a f...
Introduction File upload vulnerabilities occur when web applications allow users to upload files without properly validating their type, content, size, or name. Successful exploitation can lead to...
Introduction Command injection is a web security vulnerability that allows an attacker to execute arbitrary commands on the host operating system via a vulnerable application. This vulnerability o...