© 2023 Hashnode
#vulnerability
Overview As a CTF player, I used many tools to scan the network and get the network service version, and open ports to exploit the system. So, I use many tools like Nmap, Nikto, and Gobuster etc, But …
API security concerns have significantly increased with the rapid adoption of APIs in cloud, web, and mobile applications. Research conducted by 451 Research on the state of API security in 2022, note…
Context I have created and shared a Github project to help developers quickly deploy a Vuejs application using docker taking advantage of containerization capabilities offered by the Docker engine. On…
In Ethereum, accounts can either be Externally Owned Account, (EOA) or Contract Account. A developer may decide to allow only Externally Owned Addresses (EOA) to interact with his contract, then the d…
Active Directory Active Directory is a directory service used by organizations to store information about their users, computers, and other network resources. It's used primarily to provide a secure w…
Web application attacks are involved in 26% of all breaches, and app security is a concern for enterprises. The size of a startup does not exempt it from cyber-attacks – that's because hackers constan…
title: Unsafe deserialization vulnerability in SnakeYaml (CVE-2022-1471) published: true date: 2022-12-13 19:51:38 UTC tags: Java,OpenSource,Vulnerabilities,Security canonical_url: https://snyk.io/blo…
Introduction Apache Commons Text is a low-level library for performing various text operations such as escaping, computing string differences, and replacing placeholders in text with values looked u…
Vulnerability Assessment and Penetration Testing (VAPT) are essential tools used in the cybersecurity field. While they both serve the same purpose of identifying network vulnerabilities, they are two separate processes. Each process has it…
Having an understanding of the various types of vulnerabilities that can be found in the cyber security world can be helpful in protecting your business. There are several types of vulnerabilities including Web attacks, cross-site scripting…