Bhakti KhedkarUnderstanding CL.TE Request Smuggling: A Beginner’s GuideWelcome to the world of cybersecurity, where threats lurk in the shadows, waiting to exploit the slightest vulnerability. In this blog, we…Apr 9Apr 9
Bhakti KhedkarNoSQL injectionNoSQL injection is a vulnerability where an attacker is able to interfere with the queries that an application makes to a NoSQL database…Oct 3, 2023Oct 3, 2023
Bhakti KhedkarExploiting Boolean Based SQL VulnerabilityWhat is an SQL injection attack?Apr 5, 2023Apr 5, 2023
Bhakti KhedkarBroken Access ControlHey folks, hope you all are doing well! In OWASP Top 10 2021, the Broken Access Control (BAC) grabbed the first position with the most…Sep 12, 20221Sep 12, 20221