Recent Posts

SQL Injection: Understanding All Aspects

minute read

In this document, we provide a comprehensive explanation of SQL Injection, a common and critical vulnerability affecting web applications.

Understanding Subdomain Takeover: A Critical Security Vulnerability

minute read

Subdomain Takeover happens when a subdomain points to an inactive external resource (e.g., S3 bucket or GitHub repo), allowing attackers to exploit it by gaining control of the subdomain and using it for phishing, malware, or data theft.

CVE-2021-42245 Static Analysis

minute read

FlatCore-CMS 2.0.9 has a cross-site scripting (XSS) vulnerability in pages.edit.php through meta tags and content sections.