TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Vulnerabilities
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Sandeep Mishra (5)
Ziggy Rafiq (3)
Anupam Maiti (3)
Kanishk Kumar (2)
Harshit Pandey (1)
Rion Williams (1)
Ajay Yadav (1)
Tuhin Paul (1)
Ajay Kumar (1)
Dhanapal Chandran (1)
Vipul Jain (1)
S Ravindran (1)
Related resources for Vulnerabilities
No resource found
Threat of public Wi-Fi networks
7/19/2024 6:29:17 AM.
Public Wi-Fi networks, while convenient, pose significant security risks. These networks are often unsecured, making them vulnerable to cyber threats such as data breaches and man-in-the-middle attack
The Security Risks Of Using AI
7/3/2024 6:05:07 AM.
Investigate the pervasive security risks associated with deploying AI technologies. Explore vulnerabilities in machine learning algorithms, potential for data breaches, and ethical implications.
What Are The Node.js Security Best Practices
6/6/2024 7:52:58 AM.
Discover essential Node.js security best practices to safeguard your applications. Learn about authentication, encryption, secure coding, input validation, and more. Protect against common vulnerabili
Protection Against Busting Frame Busting
5/1/2024 11:40:26 AM.
Learn effective techniques to protect against frame busting vulnerabilities on websites. Discover how to implement robust security measures, such as Content Security Policy (CSP), to prevent clickjack
Preventing XSS in AJAX Web Apps: Best Practices & Prevention
4/30/2024 9:30:39 AM.
Explore the risks of XSS (Cross-Site Scripting) in AJAX (Asynchronous JavaScript and XML) interactions. Understand how malicious scripts can exploit client-side vulnerabilities, necessitating robust i
Hands-Free Security Scanning Within .NET Applications
4/26/2024 9:59:18 AM.
I'm sure if you follow any news sources at all, you see countless hacks, breaches, and leaks from various big-name companies which you might assume would be better at protecting your information.
Binary Cracking and Byte Patching With IDA Pro
4/23/2024 8:31:51 AM.
This dissertation explores binary patching techniques using IDA Pro, emphasizing reverse engineering, byte-level manipulation, and assembly code analysis. It covers configuring IDA Pro for patching,
Best Practices for Maintaining Security and Preventing Vulnerabilities in C#
4/9/2024 5:54:03 PM.
Explore essential security practices in C# programming with Ziggy Rafiq, covering password hashing, input validation, SQL injection prevention, cryptography, HTTPS, secret management, and staying upda
Ensuring Secure Coding in C#: Maintaining Security
3/22/2024 10:11:52 AM.
The article on secure coding in C# applications, written by Ziggy Rafiq, is a must-read for developers who want to fortify their applications against potential vulnerabilities and security threats. By
Securing PDF Uploads in MVC: Mitigating PDF Injection and Cross-site Scripting Vulnerabilities
1/15/2024 9:33:29 AM.
PDF Injection, also known as PDF XSS (Cross-site Scripting), can be a serious security vulnerability. To prevent such issues during PDF upload and viewing in an MVC (Model-View-Controller) applicatio
How to Maintain Application Security and Prevent Vulnerabilities in C#?
7/12/2023 6:33:15 AM.
This article provides essential best practices for ensuring secure coding in C#. By implementing these practices, developers can maintain the security of their applications and mitigate vulnerabilitie
Cross-Site Scripting (XSS) Vulnerabilities
5/25/2023 4:53:10 AM.
n this article, we will explore the concept of XSS vulnerabilities and delve into an example in C# to better understand how such attacks can occur. Understanding XSS is crucial for developers to build
How To Scan For OSS Vulnerabilities Using OWASP Dependency Check In .Net 6.0
4/11/2023 6:19:21 AM.
In this article, you will learn how to do OSS vulnerabilities using OWASP Dependency Check in .Net 6.0.
Web Security Vulnerabilities On User Session And Username Iteration
7/29/2021 1:57:28 PM.
In this article, you will learn about Web Security Vulnerabilities on User Session and Username Iteration.
Web Security Vulnerabilities On Clickjacking And Security HTTP Headers And Information Leakage
7/22/2021 4:51:44 AM.
In this article, you will learn about the common web security vulnerabilities with Remediation Technique.
Web Security Vulnerabilities On SSL/TLS Protocols And Set-Cookie Attributes
7/22/2021 4:36:58 AM.
In this article, you will learn about Web Security Vulnerabilities On SSL/TLS Protocols And Set-Cookie Attributes.
Using Components With Known Vulnerabilities
11/6/2020 8:22:21 PM.
In this article, you will learn how to use components with known vulnerabilities.
Real World .NET Examples Of Deserialization Vulnerabilities
10/28/2020 7:00:53 PM.
In this article, you will learn about real-world .NET examples of deserialization vulnerabilities.
Vulnerabilities From Botnets To Cybercrime
9/4/2020 7:36:14 AM.
In this article, you will learn about the vulnerabilities of botnets and cybercrime.
Scan SPFx Code For Vulnerabilities Using SonarCloud In Azure DevOps
5/12/2020 8:23:10 AM.
In this article you will learn how to scan SPFx code for vulnerabilities using SonarCloud in Azure DevOps.
OWASP Top 10 Vulnerabilities
6/26/2013 12:11:36 AM.
The OWASP Top Ten provides a powerful awareness for web application security. In this article is the top 10 security risks listed by OWASP 2013.