hacking


Topic Replies Activity
About the hacking category 1 June 25, 2019
Doubt default cipher mode AES 2 November 8, 2019
Random token like in queryStrings 8 November 6, 2019
QueryString funcionability in code project only 5 November 5, 2019
Continuously querying the server a vulnerability? 2 October 31, 2019
What is Scenario:correlations 5 October 29, 2019
Code vulnerabilities on applications 4 October 24, 2019
Common vulnerabilities on web applications 4 October 24, 2019
Are there any vulnerabilities? 4 October 22, 2019
Poll is a (national id) a leakage of business 2 October 22, 2019
Secure USERNAME length 3 October 16, 2019
Is it duplicated code? 4 October 9, 2019
Session management in mobile applications 2 October 9, 2019
Doubt about md5 function with rand 3 October 3, 2019
XXE is present but they is not used more ahead 2 October 3, 2019
Tax numbers found in code, log and migrations 8 September 4, 2019
Is it the captcha wrong implemented? 4 August 30, 2019
Is the complexity of a BREACH attack low? 6 August 28, 2019
Test DB sensitive information on source code 2 August 23, 2019
JWT validation in URL 4 August 14, 2019
Remediation for enum findings 2 August 13, 2019
QA DB with non-masked data 4 August 13, 2019
Alternatives to Nmap 6 August 10, 2019
Insecure channel found in source code 3 August 6, 2019
If without else statement? 12 August 6, 2019
How I can gain browser control 7 August 1, 2019
Vulnerability in an unused function 6 August 1, 2019
Secure headers for REST 14 August 1, 2019
Why using localstorage in JS is insecure? 5 August 1, 2019
Third-party JS obfuscation 3 August 1, 2019