Saturday , October 21 2017
Home / Vulnerabilties

Vulnerabilties

NadraGate Part 2 – PaperPk 200,000 Users Data At Risk

PaperPk 200,000 Users Data At Risk

PaperPk.com is an online Jobs Searching platform like Rozee.pk where the users can find jobs from all newspapers ads. All latest jobs are mostly advertised in newspapers like Jang , Dawn and Express Daily so people would likely have to buy a newspaper else if they are unable to buy a newspaper, they …

Read More »

OS Command Injection Vulnerability

Command Injection

Command Injection attack is also known as Arbitrary Code Execution. In Command Injection an attacker generally injects a malicious user input to the system functions which executes system shell commands based on the attacker’s input. The Command Injection vulnerability occurs when the web applications supplies vulnerable (unsafe) input fields to …

Read More »

How to detect code injection attack

code injection attack

Code injection is also known as PHP code injection. Code injection attack is an exploitation technique where a computer bug is exploited by injecting code into an application which is then executed by application itself. PHP code injection attacks are generally performed by injecting a PHP code into the PHP …

Read More »

Vulnerable SQL Websites list 2017 – Updated

SQL Injection is very popular OWASP top 10 vulnerbility which allows you to hack any website that has the vulnerability. Do you want to learn how to hack websites with SQL Injection, click here on my recent blog to get practical demonstration of SQL attack. Below given is the Vulnerable …

Read More »

RFI – LFI File Inclusion Attacks – Mitigations

file inclusion

Similar to all other cyber attacks RFI – LFI file inclusion attacks also carries a strong importance when it comes to data breach. In other words we can describe it as why the server isn’t working to load my webpages. File Inclusion File inclusion is a type of vulnerability that …

Read More »

Finding WordPress Vulnerabilities Using WpScan

WordPress Vulnerabilities

WordPress is the most popular online publishing platform, currently powering more than 26% of the web. There are approximately 76.5 million WordPress blogs. WordPress is an Open Source and anyone can start a blog or build a website in seconds without any technical knowledge. It is very easy to use. Secondly many WordPress …

Read More »

Millions Of LG G3 Smartphones Users Affected By ‘SNAP’ Vulnerability

lg g3

Researcher have discovered a serious flaw in LG G3 Android smartphones which could lead to data theft, denial of service (DoS) attacks and phishing attacks. This vulnerability “SNAP” (Smart Notice app) was identified by BugSec researchers Shachar Korot and Liran Segal. The vulnerability was discovered in LG smartphone Notice notification app …

Read More »

What are Network Vulnerabilities? Risks, Threats, Attacks?

What is network Vulnerability? Network vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free