WiKi Security Skip to main content
Background

Blog posts

SERVICE - INADEQUATE PERMISSION VALIDATION

Inadequate authorization checks gaps/weaknesses that allow unauthorized users to view, modify, or delete sensitive infor...

SERVICE-OPEN SOURCE FILE UPLOAD VULNERABILITY

Web sites use open source tools to help manage and edit web files. Since the code is open source, security vulnerabiliti...

ENCRYPTING SENSITIVE DATA WITH THE SERVER`S HTTPS PUBLIC KEY

Occasionally, when diagnosing mock hacking on a mobile app or website, there are cases in which the data is encrypted wi...

COMMAND INJECTION IN MOBILE AND IOT

Many IoT devices such as dual-mode routers, IP cameras, and door locks provide their management services, such as provid...

SQL INJECTION IN CMS

SQL injection is an attack technique in which an attacker exploits security vulnerabilities to inject and execute arbit...

CROSS SITE SCRIPTING IN CMS

Cross-site scripting (XSS) is an attack method that contains malicious scripts on a web page and is placed on the user's...

COMMAND INJECTION IN APPLICATION

Command Injection is a vulnerability in which unintentional system commands are executed by user input values that have ...

OVERFLOW IN APPLICATION

An overflow vulnerability occurs when a program that uses contiguous memory space tries to read or write data to a loca...

FILE DOWNLOAD IN ACTIVE X

File download and execution vulnerabilities refer to weaknesses that arise from the capability of ActiveX to download e...

HOW TO STRATEGICALLY PREPARATE THE DPP LAW

In the digital age, data protection has become a paramount concern for both businesses and individuals. Rwanda, cognizan...

Mounts. Made By Admin

© 2016. All Rights Reserved