Security News

What is Captcha Bypass Crowdsourcing Vulnerability?

Computer-assisted technologies and crowdsourcing may simply bypass classic anti-spam measures, driving CAPTCHAs to adapt to these tactics. A CAPTCHA, or a Completely Automated Public Turing test to Tell Computers and Humans Apart, is a typical security precaution used to differentiate human users from automated browsing apps, hence preventing automated tools from exploiting internet services. CAPTCHA …

What is Captcha Bypass Crowdsourcing Vulnerability? Read More »

What are Unvalidated Redirects and Forwards Vulnerability?

When a web application accepts untrusted input, the web application may redirect the request to a URL included inside the untrusted input. An attacker can successfully conduct a phishing scheme and steal user credentials by changing untrusted URL input to a malicious site. Because the server name in the changed URL is the same as …

What are Unvalidated Redirects and Forwards Vulnerability? Read More »

What is Application-Level Denial-of-Service (DoS) – App Crash Malformed Android Intents Vulnerability?

The Android system includes components such as Activity, Service, and Broadcast Receiver, as well as an Intent mechanism to aid in application interaction and communication. In the application, intent is in charge of specifying the action, action-related data, and supplementary data. The Android operating system is built on This Intent’s description is in charge of …

What is Application-Level Denial-of-Service (DoS) – App Crash Malformed Android Intents Vulnerability? Read More »

What is Cross-Site Scripting (XSS) TRACE Method Vulnerability?

Cross-site Scripting (XSS) and the TRACE or TRACK HTTP methods are used in a Cross-Site Tracing (XST) attack. The TRACK method operates in the same way as the TRACE method but is particular to Microsoft’s IIS web server, according to RFC 2616, “TRACE allows the client to view what is being received at the other …

What is Cross-Site Scripting (XSS) TRACE Method Vulnerability? Read More »

What is Cross-Site Scripting (XSS) Cookie-Based Vulnerability?

After a user logs in, websites and online apps often transmit a cookie to identify him or her. The user’s browser must transmit the cookie to the web application as identification for each activity the user takes on the site. If an attacker is successful in injecting a Cross-site Scripting (XSS) payload into the web …

What is Cross-Site Scripting (XSS) Cookie-Based Vulnerability? Read More »

What is Cross-Site Scripting (XSS) Flash Parameter Injection Vulnerability?

Flash applications are a proprietary format for delivering multimedia content developed by Adobe (Macromedia) that mostly consists of graphics/audio and ActionScript code. The ultimate output of a Flash program is typically a video clip, advertising banner, or online game. This format is extensively used on the Internet: YouTube utilizes Flash to distribute its material and, …

What is Cross-Site Scripting (XSS) Flash Parameter Injection Vulnerability? Read More »

Scroll to Top