New feature: Automated API Discovery from Source Code. Get Access

New feature: Automated API Discovery from Source Code. Get Access

New feature: Automated API Discovery from Source Code. Get Access

/

/

Vulnerabilities

Vulnerabilities

SQLInection Prevention Cheat Sheet

Vulnerabilities

8 Mins

SQL Injection Prevention Cheat Sheet

This blog is a guide that provides best practices and techniques for preventing SQL Injection, which is a common web application vulnerability where an attacker can manipulate SQL queries in order to gain unauthorized access to a database. Learn more about SQL Injection.

Medusa Author

Medusa

ivanti Secure Vulnerabilities

Vulnerabilities

5 Mins

Ivanti Zero-Day : Navigating CVE-2024-21887 and CVE-2023-46805 Vulnerabilities

Exploring the recent zero-day vulnerabilities in Ivanti Connect Secure and Policy Secure, and the recommended mitigations for affected organizations.

Medusa-Author

Medusa

Clickjacking vulnerability

Vulnerabilities

10 mins

Clickjacking: Understanding vulnerability, attacks and prevention

Clickjacking ( UI redressing) is a type of attack where a malicious website tricks a user into clicking on something different from what they intended

Author image

Medusa

Directory Traversal vulnerability

Vulnerabilities

8 mins

Directory Traversal: A Comprehensive Guide from Basics to Prevention

Directory Traversal vulnerability allows an attacker to access sensitive files or execute commands on the application server.

Author Image

Medusa

SSTI vulnerability

Vulnerabilities

6 mins

(SSTI) Server-side Template Injection: Explanation, Discovery, Exploitation, and Prevention

Server-side template injection (SSTI) is a vulnerability that can allow attackers to execute arbitrary code on the server.

Author

Medusa

What-is-XSS

Vulnerabilities

10 min read

XSS: What is Cross-site scripting (XSS) and how to prevent as a developer?

This blog will help developers to understand XSS, its types, how to discover and prevent it. XSS stands for Cross-Site Scripting, a type of vulnerability

Author Image

Jaydev Ahire

XML-External-entity

Vulnerabilities

8 min read

XEE: What is XML External Entity attack (XXE attack) & How to prevent as a developer?

XXE is a vulnerability in XML processing that attackers exploit to access sensitive data. Learn all about XML External Entity attack and how to prevent it.

Author Image

Jaydev Ahire

CVE-2022-23529

Vulnerabilities

3 min read

CVE-2022-23529: RCE vulnerability discovered in JsonWebToken (JWT) library (Revoked)

This blog is about the CVE-2022-23529: RCE vulnerability discovered in JsonWebToken (JWT) library (Revoked).

Jaydev Ahire

Monthly product updates in your inbox. No spam.

No spam. Ever.