Category: Vulnerabilities explained

Explain some vulnerabilities principles, how it works, how to exploit them to understand how to avoid them.

SQL Injection

SQL Injection is quite a common vulnerabilities, well known by most experienced developpers but still not managed correctly in lots of applications/websites. To see the number of vulnerabilities and the systems impacted, you can have a look at: The

Posted in Vulnerabilities explained Tagged with: ,

HTTP Response Splitting

HTTP response splitting is a form of HTTP header injection, the goal is to force the server to inject our own HTTP header in the response. The principles HTTP request or response are based on the same principle:   Where

Posted in Vulnerabilities explained Tagged with: