Aswin KVinPython in Plain EnglishUnveiling the Hidden Realm: The Secret Life of Data Pipelines in CybersecurityUnraveling the Intricate Journey of Data Pipelines in CybersecurityJul 10, 2023Jul 10, 2023
Aswin KVinSystem WeaknessCritical Union-Based SQL Injection VulnerabilityUnauthorized Access and Data Leakage via Union-Based SQL InjectionMay 30, 20231May 30, 20231
Aswin KVinLevel Up CodingCognitive Complexity of functions should not be too highVulnerability Analysis: Cognitive Complexity Violation in Code SnippetMay 27, 2023May 27, 2023
Aswin KVinInfoSec Write-upsURN InjectionHigh-severity vulnerability enables unauthorized access and potential data leakage.May 26, 2023May 26, 2023
Aswin KVinJavaScript in Plain EnglishClient Side Template Injection (CSTI)Impact, Exploitation, and Recommended Mitigation MeasuresMay 21, 2023May 21, 2023
Aswin KVinInfoSec Write-upsSQL Injection Vulnerability in GoLang Code #2Analyzing SQL Injection Vulnerability in GoLang Code for Enhanced SecurityMay 13, 2023May 13, 2023
Aswin KVinInfoSec Write-upsCVE-2022–26180:qdPM 9.2 CSRF Vulnerability in index.php/myAccount/update URIUnauthorized actions can be performed on behalf of authenticated users, compromising the security of qdPM 9.2May 11, 2023May 11, 2023
Aswin KVinSystem WeaknessRuby Code Vulnerability Analysis: ConfirmSnsSubscription RCEIdentifying and Addressing Security Concerns in a Ruby SNS Subscription Confirmation ClassMay 5, 2023May 5, 2023
Aswin KVinInfoSec Write-upsGO Code Review #1 : Hard-coded credentials are security-sensitiveAnalysis of Hard-Coded Credentials in GO Code: Mitigating Security Risks and Best PracticesMay 3, 20231May 3, 20231
Aswin KVinInfoSec Write-upsLDAP InjectionA Critical Security Flaw Exposing the Application to LDAP Injection AttacksMay 2, 20231May 2, 20231