What are Multiple Apache Vulnerabilities?

Blog In this article, Apache Server and its vulnerabilities, and ways to mitigate these threats will be talked about. How to find the website’s server? There are multiple tools available to find out which web server is used. The first of these is curl -I command. curl -I command is run on terminal in order […]
What Is Jquery XSS Vulnerability Version?

Blog Let’s start with what jquery and XSS are. Jquery is a library of JavaScript. It was created to facilitate the use of JavaScript on websites. It is not a separate programming language and works with JavaScript. A cross-site scripting attack (XSS) occurs when a hacker injects malicious code, usually in the form of client-side […]
What is File Upload Vulnerability?

Blog File upload vulnerabilities are when a web server allows users to upload files to its filesystem without sufficiently validating things like their name, type, contents, or size. Failing to properly enforce restrictions on these could mean that even a basic image upload function can be used to upload arbitrary and potentially dangerous files instead. […]
What is Weak SSL Algorithms?

Blog Sensitive data must be protected when transmitted over the network. This data may include user credentials and credit card information. Servers are authenticated using digital certificates. These are SSL/TLS certificates. TLS encrypts communication between servers and web applications, such as web browsers that load a website. TLS uses one or more cipher suites to […]
What is Server Header Information Disclosure?

Blog In this article, what is Server Header Information Disclosure and what ways it causes will be discussed. While the web server sends HTTP headers to the user to respond, it exposes the server version and the technologies used by the web server. This information plays an important role in determining the attack techniques of […]
What is SSL Expire?

Blog SSL Certificate An SSL certificate is a digital certificate that authenticates a website and encrypts information sent to a server using this technology. How to learn SSL certificate duration? There are websites to query the expiration time of the SSL certificate. Secondly, the SSL certificate duration can be learned with the following command line […]
What is SMTP Open Mail Relay Vulnerability?

Blog SMTP (Simple Mail Transfer Protocol) SMTP, e-mail protocols are sets of rules that let different e-mail clients and accounts easily exchange information. It is also the only dedicated protocol for sending e-mails. Most e-mail clients including Outlook, Apple Mail, Gmail, and Yahoo Mail rely on SMTP to “push” or send messages from a sender […]
What are Multiple Microsoft IIS Vulnerabilities?

Blog In this article, Microsoft IIS Server, its vulnerabilities, and ways to mitigate these threats will be discussed. How to find the website’s server? There are multiple tools available to find out which web server is used. The first of these is curl -I command. curl -I command is run on terminal in order to […]
What are Multiple Nginx Vulnerabilities?

Blog In this article, Nginx Server and its vulnerabilities, and ways to mitigate these threats will be talked about. How to find the website’s server? There are multiple tools available to find out which web server is used. The first of these is curl -I command. curl -I command is run on terminal in order […]