In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting…
The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to…
Web cache poisoning is an advanced hacking technique through which an attacker can exploit the pattern or behavior of a…
Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…