DNS cache poisoning attacks try to fool applications into connecting to a malicious IP address by flooding a DNS resolver cache with fake addresses corresponding to requested domain names. Due…
Website Security
Authentication Bypass Vulnerability in the WP Like Button plugin version 1.6.0 allows unauthenticated attackers to change the settings of the plugin. The contains() function in wp_like_button.php did not check if…
CSRF stands for cross-site request forgery. It’s also known as session riding or XSRF, when we are browsing a website it requests data from other websites on our site. in…
Havij is a Security Tool which is used to test website security, Havij last version was 17.2 after that they don’t update it and the official website has been closed…
1. Keep Your Website and Plugin’s Update The easy way is to keep your site secure update your WordPress Website Regularly base, So You will be website will be old…
Hi, this is Shahid Malla, in this article i have basic SQLi strings for you, which is used to exploit the website. if you want to check your website is…
The SQL injection cheat sheet Hi, i am shahid Malla and here i have a new article for you on SQL injection cheat sheet contains examples of the useful syntax…
Web Application Vulnerabilities 1. SQL InjectionSQL stands for the structured query language. The SQL injection is an injection attack which gives an attacker the feasibility to inject or we can…
Best methods to avoid File Upload Vulnerabilities Let’s discuss, How we can avoid File Upload Vulnerability and What are the different types of File Upload Vulnerability that may happen- Generally,…
How to Protect Website from XSS attack This article shows one method that developers of web applications can use to protect their websites from XSS attacks. Before going to explore…