Security Awareness
  • Home
  • News
  • Linux
  • Tools
  • Tricks
  • What is
  • Video
  • Tutorials

XPath Injection Vulnerability

Tricks

XPath Injection & Blind XPath Injection Vulnerability

XPath Injection Similar to SQL injection, XPath injection occurs when the site uses the information entered by the user to construct the request for XML data. An attacker sends specially constructed information to the site to explore how the XML used by the site is constructed, and even to obtain Read more…

 119 total views,  1 views today

By root, 6 yearsFebruary 14, 2017 ago
Recent Posts
  • Chmod, file permission, and the octal notation
  • PuTTY 0.71 Released
  • MITMsmtp v0.0.2 released
  • conjur v1.4.0 releases
  • testssl.sh v3.0 rc5 releases
Recent Comments
  • root on Most commonly Used Linux Commands
  • power cooker recipes on PuTTY 0.69 released
  • bad Jokes on Most commonly Used Linux Commands
Categories
  • Linux
  • News
  • Tools
  • Tricks
  • Tutorials
  • Video
  • What is
Enjoy this post ?

If you think my work deserves to be rewarded ? Then

  • Home
  • About
  • Privacy Policy
  • Donations
  • Contact
Hestia | Developed by ThemeIsle