RajeevThe Eternal Dichotomy: Cookies vs JWTsDesign considerations for state maintenance will have security consequencesJan 14Jan 14
RajeevCanvas of Intrigue: A `Refreshing` Approach to Session Token Exfiltration with XSSA story of infiltration transcending security layers with a novel approachSep 30, 2023Sep 30, 2023
RajeevCookie Conundrum: Why the Root Path Isn’t Always RightSubdirectory hosting, also known as subfolder hosting, is a web hosting approach where multiple web applications are hosted under a single…Sep 23, 2023Sep 23, 2023
RajeevTemplating the Unthinkable: From Injection to Remote ControlA Tale of Server Side Template Injection leading to Remote Code ExecutionAug 9, 20231Aug 9, 20231
RajeevDecoding a known vulnerability on jquery-ui (CVE-2022–31160)Often these days, web applications are built with fragile architectures which depend on various open source dependencies directly or…Jul 2, 2023Jul 2, 2023
RajeevCross-Site Scripting on a Text EditorCross-site scripting is the most pervasive vulnerability in web applications. There are many approaches and contexts to acheive this…Apr 4, 2023Apr 4, 2023
RajeevComprehensive guide on SAML Authentication attacksSecurity Assertion Markup Language (SAML)Feb 12, 2023Feb 12, 2023
RajeevDNS Rebinding attackDNS Rebinding is a method of bypassing Same Origin Policy by manipulating DNS resolutionFeb 8, 20231Feb 8, 20231