XML Attack or XXE, Impact, Techniques to Attack, Mitigation
XML Attack (eXtensible Markup Language) is a widely used language for structuring and organizing data in a hierarchical format.
Cross Site Scripting or XSS Attack | How to Detect and prevent from XSS Attack
Cross-Site Scripting (XSS) attack occurs where an attacker injects malicious code into a web page, then executed by users who view that page.
OS Command Injection Attack, Prevent and Detect with Examples
OS Command Injection occurs when an attacker is able to execute arbitrary operating system commands on a target system.
Code Injection Attack | How to inject the code into the website
Code injection attack is a vulnerability and attack that allows an attacker to inject malicious code into a target system or application.
XPath Injection and What are the Impact and Mitigation of XPath Injection
XPath Injection occurs when an attacker manipulate or inject malicious data used by the application to retrieve data from an XML document
CRLF Injection and What are the Impact and Mitigation of CRLF Injection
CRLF Injection occurs when an attacker is able to inject Carriage Return (CR) and Line Feed (LF) characters into the HTTP response header.
LDAP Injection and What are the Impact and Mitigation of LDAP
LDAP Injection is a vulnerability that occurs when untrusted data is improperly handled that interacts with LDAP servers or directories.
Host Header Injection | How to Attack the Header of a Request
Host header injection is vulnerability that occurs when an attacker can inject malicious content into the Host header of an HTTP request.