Open in app

Sign In

Write

Sign In

Aswin KV
Aswin KV

488 Followers

Home

Lists

About

Published in

Python in Plain English

·Jul 10

Unveiling the Hidden Realm: The Secret Life of Data Pipelines in Cybersecurity

Unraveling the Intricate Journey of Data Pipelines in Cybersecurity — Data pipelines are essential for effectively handling and processing massive volumes of information in the field of cybersecurity. This article seeks to explore the technical details of data pipelines in cybersecurity, giving readers a thorough knowledge of the fundamental principles and showcasing how code can be used to construct a…

Data Science

5 min read

Unveiling the Hidden Realm: The Secret Life of Data Pipelines in Cybersecurity
Unveiling the Hidden Realm: The Secret Life of Data Pipelines in Cybersecurity
Data Science

5 min read


Published in

System Weakness

·May 30

Critical Union-Based SQL Injection Vulnerability

Unauthorized Access and Data Leakage via Union-Based SQL Injection — Summary: This vulnerability allows an attacker to run arbitrary SQL queries on the application’s database, which might result in unapproved access, data leaking, or even total system penetration. The technical information about the vulnerability, its effects, and suggested countermeasures are included in the report that follows.

Programming

4 min read

Critical Union-Based SQL Injection Vulnerability
Critical Union-Based SQL Injection Vulnerability
Programming

4 min read


Published in

Level Up Coding

·May 27

Cognitive Complexity of functions should not be too high

Vulnerability Analysis: Cognitive Complexity Violation in Code Snippet — Summary: The provided code sample illustrates how the rule of keeping the cognitive complexity of functions minimal is broken. Although it doesn’t have any overt security flaws, the intricacy of the code may make it difficult to comprehend and maintain. This analysis report identifies the troublesome regions and offers suggestions for…

Programming

4 min read

Cognitive Complexity of functions should not be too high
Cognitive Complexity of functions should not be too high
Programming

4 min read


Published in

InfoSec Write-ups

·May 26

URN Injection

High-severity vulnerability enables unauthorized access and potential data leakage. — Summary: This bug bounty report highlights a critical URN (Uniform Resource Name) Injection vulnerability . Exploiting this vulnerability allows unauthorized access to sensitive resources and potentially results in data leakage. Immediate attention and mitigation measures are necessary to safeguard the system’s integrity and protect user information.

Bug Bounty

2 min read

URN Injection
URN Injection
Bug Bounty

2 min read


Published in

JavaScript in Plain English

·May 21

Client Side Template Injection (CSTI)

Impact, Exploitation, and Recommended Mitigation Measures — Summary When an application permits user-supplied input to be used in a template that is displayed on the client-side, a vulnerability known as Client Side Template Injection (CSTI) arises. This may result in the execution of arbitrary code inside the boundaries of the compromised application. Description It is similar to Server Side…

Bug Bounty

2 min read

Client Side Template Injection (CSTI)
Client Side Template Injection (CSTI)
Bug Bounty

2 min read


Published in

InfoSec Write-ups

·May 13

SQL Injection Vulnerability in GoLang Code #2

Analyzing SQL Injection Vulnerability in GoLang Code for Enhanced Security — Overview: The vulnerable code snippet concatenates user-provided input directly into an SQL statement, making it susceptible to malicious SQL injection attacks. The report emphasizes the importance of adopting secure coding practices, such as utilizing prepared statements and implementing input validation techniques, to mitigate the risk of SQL injection vulnerabilities.

Programming

4 min read

SQL Injection Vulnerability in GoLang Code #2
SQL Injection Vulnerability in GoLang Code #2
Programming

4 min read


Published in

InfoSec Write-ups

·May 11

CVE-2022–26180:qdPM 9.2 CSRF Vulnerability in index.php/myAccount/update URI

Unauthorized actions can be performed on behalf of authenticated users, compromising the security of qdPM 9.2 — Summary: Through the “index.php/myAccount/update” URI, the qdPM 9.2 application is susceptible to Cross-Site Request Forgery (CSRF) attacks. The security and integrity of the application might possibly be jeopardized by this vulnerability, which enables an attacker to carry out unauthorized operations on behalf of an authenticated user.

Bug Bounty

3 min read

CVE-2022–26180:qdPM 9.2 CSRF Vulnerability in index.php/myAccount/update URI
CVE-2022–26180:qdPM 9.2 CSRF Vulnerability in index.php/myAccount/update URI
Bug Bounty

3 min read


Published in

System Weakness

·May 5

Ruby Code Vulnerability Analysis: ConfirmSnsSubscription RCE

Identifying and Addressing Security Concerns in a Ruby SNS Subscription Confirmation Class — Overview The security flaws discovered in the Ruby code snippet for the ConfirmSnsSubscription class have been thoroughly examined in this report. The remote code execution (RCE) vulnerability was the main focus of the code review to find any potential security problems. …

Cybersecurity

4 min read

Ruby Code Vulnerability Analysis: ConfirmSnsSubscription RCE
Ruby Code Vulnerability Analysis: ConfirmSnsSubscription RCE
Cybersecurity

4 min read


Published in

InfoSec Write-ups

·May 3

GO Code Review #1 : Hard-coded credentials are security-sensitive

Analysis of Hard-Coded Credentials in GO Code: Mitigating Security Risks and Best Practices — Overview Reviewers evaluated the code’s quality, maintainability, and compliance with best practices. I was especially concerned with locating possible security holes and places that needed repair. Regarding hard-coded credentials, this report highlights one crucial security issue. Sensitive Code Example

Programming

3 min read

GO Code Review #1 : Hard-coded credentials are security-sensitive
GO Code Review #1 : Hard-coded credentials are security-sensitive
Programming

3 min read


Published in

InfoSec Write-ups

·May 2

LDAP Injection

A Critical Security Flaw Exposing the Application to LDAP Injection Attacks — Summary: This vulnerability has the potential to cause data leaking, unauthorised access, and other major security problems. To safeguard user data and system integrity, we firmly advise that this problem be given prompt attention and resolution. Vulnerability Details: LDAP (Lightweight Directory Access Protocol) injection is a code injection technique that…

Bug Bounty

3 min read

LDAP Injection
LDAP Injection
Bug Bounty

3 min read

Aswin KV

Aswin KV

488 Followers
Following
  • Steven Laine

    Steven Laine

  • SocialVibes

    SocialVibes

  • W. Jon McClure

    W. Jon McClure

  • Elisabeth Roberts

    Elisabeth Roberts

  • David Rudder

    David Rudder

See all (882)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams