Tutorialspoint.dev
Welcome To Tutorialspoint.dev
Officially launched 18th May 2019
Python secure-coding vulnerability

Vulnerability in input() function – Python 2.x

This article aims at explaining and exploring the vulnerability in the input() function in Python 2.x. In Python 3, the raw_input() function was erased, and it&#x2019...
GBlog SQL Web Technologies

How to use SQLMAP to test a website for SQL Injection vulnerability

This article explains how to test whether a website is safe from SQL injection using the SQLMAP penetration testing tool. What is SQL Injection? SQL Injection is a co...
GBlog SQL Web Technologies

How to use SQLMAP to test a website for SQL Injection vulnerability

This article explains how to test whether a website is safe from SQL injection using the SQLMAP penetration testing tool. What is SQL Injection? SQL Injection is a co...
GBlog secure-coding system-programming

Meltdown Security Vulnerability

What is Meltdown security vulnerability? Meltdown, also known as Rogue Data Cache Load, is a security vulnerability that affects microprocessors of the types Intel x8...
Advanced Computer Subject C C++

Command Injection Vulnerability and Mitigation

Command injection is basically injection of operating system commands to be executed through a web-app. The purpose of the command injection attack is to inject and e...
Advanced Computer Subject C secure-coding

Format String Vulnerability and Prevention with Example

A format string is an ASCII string that contains text and format parameters. Example: // A statement with format string printf("my name is : %s ", "Aka...

Subscribe to Our Newsletter