#hacking
Read more stories on Hashnode
Articles with this tag
What is API Abuse? API abuse refers to the act of wrong-handling of APIs, gaining unsanctioned access, and modifying the key functions so that APIs...
What is LaTex Injection? The "LaTeX Injection" vulnerability is a security issue affecting web applications that allow users to enter LaTeX-formatted...
What is Deserialization Attack? Deserialization is the process of restoring this byte stream to a fully functional replica of the original object, in...
What is LDAP Injection? LDAP injection arises when user-controllable data is copied in an unsafe way into an LDAP query that is performed by the...
What is NoSQL Injection? NoSQL databases provide looser consistency restrictions than traditional SQL databases. By requiring fewer relational...
What is Type Juggling? Type Juggling (also known as Type Confusion) vulnerabilities are a class of vulnerabilities wherein an object is initialized or...