Umesh Kumar6.Access control vulnerabilities and privilege escalationWhat is access control?Dec 4, 2022Dec 4, 2022
Umesh Kumar5.Information disclosure vulnerabilitiesWhat is information disclosure?Dec 1, 2022Dec 1, 2022
Umesh Kumar4.Business logic vulnerabilitiesWhat are business logic vulnerabilities?Nov 26, 2022Nov 26, 2022
Umesh Kumar3.How to exploit OS command injectionWhat is OS command injection?Nov 23, 2022Nov 23, 2022
Umesh Kumar2.Performing Directory traversal AttackWhat is directory traversal?Nov 19, 2022Nov 19, 2022
Umesh Kumar1.SQL INJECTION(SQLi)/HOW TO EXPLOIT ITWhat is SQL injection (SQLi)?Nov 14, 2022Nov 14, 2022