Tag

vulnerabilities

0 views collected around this technical thread.

php中文网 Courses
php中文网 Courses
Jul 1, 2024 · Information Security

PHP Security Best Practices: Protecting Applications from Common Vulnerabilities

This article explains why PHP security is critical and outlines five common PHP vulnerabilities—SQL injection, XSS, CSRF, remote code execution, and file inclusion—along with comprehensive best‑practice recommendations such as input validation, secure password storage, session management, error handling, and continuous learning.

PHPWeb Developmentbest practices
0 likes · 18 min read
PHP Security Best Practices: Protecting Applications from Common Vulnerabilities
AntTech
AntTech
Aug 31, 2023 · Information Security

In-Depth Analysis of Apple UserFS Architecture, Control Flow, and Vulnerabilities

This article provides a comprehensive examination of Apple’s UserFS, detailing its architecture, mounting and file‑access control flows, exposing three real vulnerabilities (CVE‑2022‑42861, CVE‑2022‑42842, a kernel UAF) and discussing how UserFS reshapes the iOS file‑system security model.

AppleCVEFile System
0 likes · 14 min read
In-Depth Analysis of Apple UserFS Architecture, Control Flow, and Vulnerabilities
Architect
Architect
Apr 30, 2023 · Information Security

Common API Vulnerabilities and How to Detect Them

This article explains the most frequent API security weaknesses—including information disclosure, broken object‑level and function‑level authorization, authentication bypass, over‑exposure of data, missing rate limits, mass‑assignment, misconfiguration, injection, asset mismanagement, and business‑logic flaws—providing detection techniques and illustrative code examples.

API securityAuthenticationRate Limiting
0 likes · 17 min read
Common API Vulnerabilities and How to Detect Them
Python Programming Learning Circle
Python Programming Learning Circle
May 24, 2022 · Information Security

Common Python Vulnerabilities and How to Secure Them

This article outlines the most frequent security flaws in Python—including command injection, outdated versions, unsafe temporary files, misuse of assert statements, and import path issues—while offering practical mitigation strategies to help developers protect their applications.

best practicescode safetysecurity
0 likes · 6 min read
Common Python Vulnerabilities and How to Secure Them
Laravel Tech Community
Laravel Tech Community
Apr 12, 2022 · Information Security

Common PHP Weak‑Type Vulnerabilities: MD5 Collision, is_numeric, in_array, switch, and intval Issues

This article explains several PHP weak‑type pitfalls—including MD5 hash collisions, improper handling by is_numeric, unexpected behavior of in_array and switch, and intval casting quirks—showing how they can lead to security problems such as hash collisions, SQL injection, and logic errors.

Hash CollisionPHPWeak Typing
0 likes · 4 min read
Common PHP Weak‑Type Vulnerabilities: MD5 Collision, is_numeric, in_array, switch, and intval Issues
IT Services Circle
IT Services Circle
Feb 16, 2022 · Information Security

10 Unknown Security Pitfalls for Python

This article outlines ten lesser‑known Python security pitfalls—from optimized‑away asserts and directory permission quirks to path traversal, regex misuse, Unicode normalization attacks, and IP address normalization—illustrating how subtle language features can lead to serious vulnerabilities in real‑world applications.

Code ReviewPythonbest practices
0 likes · 16 min read
10 Unknown Security Pitfalls for Python
Laravel Tech Community
Laravel Tech Community
Oct 10, 2021 · Information Security

Common PHP Security Vulnerabilities and Mitigation Strategies

This article outlines ten common PHP security threats—including SQL injection, XSS, CSRF, LFI, weak password hashing, MITM, command injection, XXE, improper error reporting, and login rate limiting—explaining how each attack works and providing practical mitigation techniques such as prepared statements, input sanitization, CSRF tokens, and HTTPS.

BackendMitigationPHP
0 likes · 15 min read
Common PHP Security Vulnerabilities and Mitigation Strategies
Laravel Tech Community
Laravel Tech Community
Jun 23, 2021 · Information Security

Common Sensitive Data Protection Issues in PHP Applications and Their Mitigation

The article outlines typical ways PHP projects mishandle sensitive data—such as storing passwords in plain text, transmitting credentials without encryption, using weak hashing algorithms, and exposing server details—and provides practical configuration and coding measures to secure data at rest and in transit.

EncryptionPHPSensitive Data
0 likes · 6 min read
Common Sensitive Data Protection Issues in PHP Applications and Their Mitigation
php中文网 Courses
php中文网 Courses
Nov 2, 2020 · Information Security

Common Web Security Vulnerabilities: XSS, SQL Injection, CSRF, CC, DoS and DDoS

This article explains common web security threats—including XSS, SQL injection, CSRF, CC, DoS, and DDoS—detailing their mechanisms, potential impacts, and practical defense strategies such as input validation, token usage, Referer checks, and resource limiting to protect applications and servers.

CSRFDoSSQL injection
0 likes · 14 min read
Common Web Security Vulnerabilities: XSS, SQL Injection, CSRF, CC, DoS and DDoS
Laravel Tech Community
Laravel Tech Community
Aug 10, 2020 · Information Security

Comprehensive Penetration Testing Process, Common Vulnerabilities, Exploitation Techniques, and Security Interview Questions

This article provides a detailed walkthrough of web penetration testing steps, extensive Q&A on common vulnerabilities such as SQL injection, XSS, CSRF, SSRF, file inclusion, privilege escalation methods, mitigation strategies, and interview preparation tips for security professionals.

Web Securityexploitationpenetration testing
0 likes · 44 min read
Comprehensive Penetration Testing Process, Common Vulnerabilities, Exploitation Techniques, and Security Interview Questions
Architects Research Society
Architects Research Society
Jul 8, 2020 · Information Security

Top 25 Software Errors (CWE) and Resources for Mitigation

The article presents the CWE Top 25 software errors, detailing each weakness with its ID and description, and provides links to MITRE entries, remediation guidance, and various SANS training resources aimed at helping developers mitigate these common vulnerabilities.

CWEMitigationSANS
0 likes · 17 min read
Top 25 Software Errors (CWE) and Resources for Mitigation
360 Tech Engineering
360 Tech Engineering
Nov 21, 2018 · Blockchain

Double-Spend Attacks on Major Public Blockchains: Vulnerabilities and Mitigation

This article surveys multiple double‑spend attack vectors discovered on major public blockchains such as Bitcoin, EOS, and NEO, classifies them into verification flaws, VM execution inconsistencies, and consensus weaknesses, and proposes an efficient mitigation method based on write‑operation hashing.

BlockchainConsensusDouble Spend
0 likes · 22 min read
Double-Spend Attacks on Major Public Blockchains: Vulnerabilities and Mitigation
360 Quality & Efficiency
360 Quality & Efficiency
Apr 13, 2018 · Information Security

Common Web Application Vulnerabilities and Their Attack Methods

This article introduces the most common web application vulnerabilities—including SQL injection, XSS, CSRF, file upload, file inclusion, clickjacking, and URL redirect—explaining how attackers exploit them and the potential impacts on websites and their users.

CSRFFile UploadSQL injection
0 likes · 8 min read
Common Web Application Vulnerabilities and Their Attack Methods
Baidu Intelligent Testing
Baidu Intelligent Testing
Nov 24, 2016 · Information Security

Analysis of Common Android App Vulnerabilities and Mitigation Strategies

This article analyzes recent Android app security scan data, detailing prevalent vulnerabilities such as log leakage, weak encryption, WebView password storage, unsafe PendingIntent usage, and dynamic broadcast receiver exposure, and provides concrete code examples and remediation recommendations for developers.

AndroidBroadcastEncryption
0 likes · 10 min read
Analysis of Common Android App Vulnerabilities and Mitigation Strategies
Architects Research Society
Architects Research Society
Nov 24, 2015 · Information Security

Understanding Common Web Application Attacks and the OWASP Top 10

The article explains how modern web and cloud‑based applications are increasingly exposed to a range of application‑layer attacks—including injection, XSS, broken authentication, and insecure redirects—while highlighting OWASP’s Top 10 list, the importance of secure development practices, and IBM’s educational webinar series.

OWASPSecure CodingWeb Security
0 likes · 10 min read
Understanding Common Web Application Attacks and the OWASP Top 10