#information-technology
Read more stories on Hashnode
Articles with this tag
Recently, the Threat Research Unit of Qualys Company disclosed a Glibc vulnerability. The Glibc library has a buffer overflow vulnerability when...
Introduction Internet of Vehicles security is currently a popular development direction, but most people are stuck here because its entry threshold is...
Source :- https://tutorialboy24.blogspot.com/2022/09/a-talk-about-java-serialization-and.html Preface The current popularity of Java security can be...
Source :- https://tutorialboy24.blogspot.com/2022/09/turning-cookie-based-xss-into-account.html The cookie-based XSS One evening I started hunting on...
Source :- https://tutorialboy24.blogspot.com/2022/11/a-brief-introduction-to-saml-security.html Introduction Testing for vulnerabilities by manually...
Cross-Site Scripting (XSS) is one of the most commonly encountered attacks in web applications. If an attacker can inject a JavaScript code into the...