Aswin KVinPython in Plain EnglishUnveiling the Hidden Realm: The Secret Life of Data Pipelines in CybersecurityUnraveling the Intricate Journey of Data Pipelines in Cybersecurity5 min read·Jul 10, 2023----
Aswin KVinSystem WeaknessCritical Union-Based SQL Injection VulnerabilityUnauthorized Access and Data Leakage via Union-Based SQL Injection4 min read·May 30, 2023--1--1
Aswin KVinLevel Up CodingCognitive Complexity of functions should not be too highVulnerability Analysis: Cognitive Complexity Violation in Code Snippet4 min read·May 27, 2023----
Aswin KVinInfoSec Write-upsURN InjectionHigh-severity vulnerability enables unauthorized access and potential data leakage.2 min read·May 26, 2023----
Aswin KVinJavaScript in Plain EnglishClient Side Template Injection (CSTI)Impact, Exploitation, and Recommended Mitigation Measures2 min read·May 21, 2023----
Aswin KVinInfoSec Write-upsSQL Injection Vulnerability in GoLang Code #2Analyzing SQL Injection Vulnerability in GoLang Code for Enhanced Security4 min read·May 13, 2023----
Aswin KVinInfoSec Write-upsCVE-2022–26180:qdPM 9.2 CSRF Vulnerability in index.php/myAccount/update URIUnauthorized actions can be performed on behalf of authenticated users, compromising the security of qdPM 9.23 min read·May 11, 2023----
Aswin KVinSystem WeaknessRuby Code Vulnerability Analysis: ConfirmSnsSubscription RCEIdentifying and Addressing Security Concerns in a Ruby SNS Subscription Confirmation Class4 min read·May 5, 2023----
Aswin KVinInfoSec Write-upsGO Code Review #1 : Hard-coded credentials are security-sensitiveAnalysis of Hard-Coded Credentials in GO Code: Mitigating Security Risks and Best Practices3 min read·May 3, 2023--1--1
Aswin KVinInfoSec Write-upsLDAP InjectionA Critical Security Flaw Exposing the Application to LDAP Injection Attacks3 min read·May 2, 2023--1--1