Data Structure
Java
Python
HTML
Interview Preparation
Tutorials
Courses
Tracks
DSA
Practice Problems
C
C++
Java
Python
JavaScript
Data Science
Machine Learning
Courses
Linux
DevOps
Similar Topics
Web Technologies
32.1K+ articles
DSA
20.0K+ articles
JavaScript
9.9K+ articles
Misc
7.7K+ articles
C Language
1.3K+ articles
Ethical Hacking
818+ articles
Cyber-security
426+ articles
Information-Security
269+ articles
Network-security
140+ articles
secure-coding
25+ articles
vulnerability
15 posts
Recent Articles
Popular Articles
Best Practices for Secure Coding in Web Applications
Last Updated: 26 September 2025
Web applications are essential for corporations to deliver digital offerings, and they have got grow to be increasingly important in recent years as increasingly human bei...
read more
secure-coding
vulnerability
Cyber-security
Ethical Hacking - Hacking Web Applications
Websites & Apps
Web Security
Understanding Blind XSS for Bug Bounty Hunting
Last Updated: 07 July 2021
Blind XSS VulnerabilityBlind XSS is quite similar to stored Cross-Site Scripting attack where the input provided by the attacker is saved or stored by the web server and t...
read more
JavaScript
Web Technologies
Information-Security
vulnerability
Web-Programs
Cyber-security
DOM-based Cross-Site Scripting Attack in Depth
Last Updated: 27 July 2025
In this article, we will be understanding one of the types of Cross-Site Scripting in-depth i.e DOM-based XSS. Let's discuss it one by one as follows.DOM-based Cross Site ...
read more
JavaScript
Web Technologies
Information-Security
vulnerability
Cyber-security
Understanding Stored XSS in Depth
Last Updated: 14 July 2021
In this article, we will understand one of the types of Cross-Site Scripting in-depth, i.e. Stored XSS.What is Stored Cross-Site Scripting?Stored Cross-Site Scripting vuln...
read more
JavaScript
Web Technologies
Information-Security
vulnerability
Network-security
Cyber-security
OpenVAS : Security Assessment
Last Updated: 23 July 2025
OpenVAS is an open-source vulnerability scanning and management tool that helps to identify security issues like misconfigurations, outdated software, and weak passwords t...
read more
Misc
Computer Networks
Information-Security
vulnerability
Race Condition
Last Updated: 27 August 2025
Race condition occurs when multiple threads or processes read and write the same variable i.e. they have access to some shared data and they try to change it at the same t...
read more
Technical Scripter
Operating Systems
Technical Scripter 2020
Information-Security
vulnerability
Network-security
Cyber-security
Symfonos2 VulnHub Walkthrough
Last Updated: 24 May 2024
The CTF or Check the Flag problem is posted on vulnhub.com. Vulnhub is a platform that provides vulnerable applications/machines to gain practical hands-on experience in t...
read more
Ethical Hacking
vulnerability
What is PrintDemon?
Last Updated: 19 September 2023
PrintDemon is a vulnerability striking Windows system. The vulnerability was identified in the Windows Print Spooler. The vulnerability was first discovered and reported b...
read more
Misc
GBlog
Articles
vulnerability
Cyber-security
Vulnerabilities in Information Security
Last Updated: 18 September 2025
Vulnerabilities are weaknesses in a system that give threats the opportunity to compromise an individual's or an organisation's assets. As the attackers are leveling up th...
read more
Ethical Hacking
Information-Security
vulnerability
Network-security
Sybil Attack
Last Updated: 11 July 2025
A Sybil Attack in peer-to-peer networks involves a single entity operating multiple simultaneous fake identities to undermine reputation systems and gain majority influenc...
read more
Ethical Hacking
Information-Security
vulnerability
DFD Based Threat modelling | Set 1
Last Updated: 11 July 2025
Prerequisite - Threat ModellingDFD based Threat Modelling is one of the methods to visually represent the system being modelled with the other being Process Diagram based ...
read more
Misc
Computer Networks
Information-Security
vulnerability
Meltdown Security Vulnerability
Last Updated: 29 September 2022
What is Meltdown security vulnerability?Meltdown, also known as Rogue Data Cache Load, is a security vulnerability that affects microprocessors of the types Intel x86, IBM...
read more
Misc
Ethical Hacking
system-programming
secure-coding
vulnerability
Vulnerability in input() function – Python 2.x
Last Updated: 29 March 2024
This article aims to explain and explore the vulnerability in the input() function in Python 2.x. In Python 3, the raw_input() function was erased, and its functionality w...
read more
Python
secure-coding
vulnerability
Command Injection Vulnerability and Mitigation
Last Updated: 14 June 2022
Command injection is basically injection of operating system commands to be executed through a web-app. The purpose of the command injection attack is to inject and execut...
read more
C Language
secure-coding
vulnerability
Format String Vulnerability and Prevention with Example
Last Updated: 07 March 2024
A format string is an ASCII string that contains text and format parameters. Example:// A statement with format stringprintf("my name is : %s\n", "Akash");// Output// My ...
read more
Computer Subject
C Language
secure-coding
vulnerability