Harnam Singh

Blueimp’s jQuery 9.22.0 – (Arbitrary) File Upload (Metasploit)

As the Metasploit discloses the new blueimp’s jQuery 9.22.0 RCE vulnerability which allows attackers to remotely execute code on the server which runs blueimp’s jQuery to get reverse meterpreter shell in return. This leads to the major issue and can give complete access to the server to the attacker.  The blueimp’s jQuery is a  File …

Blueimp’s jQuery 9.22.0 – (Arbitrary) File Upload (Metasploit) Read More »

Future Scope Java vs Python ?

Many developers would agree that python is simple and more productive and the other hand java is difficult and complex. The programming language writes an efficient program for critical problems and for mobile applications, web applications, and games, etc. Python has easy syntax while java has complex syntax. Python : Python is more productive than …

Future Scope Java vs Python ? Read More »

Why Is Python The Top Choice Among Cyber Security Professionals?

Python is a high-level programming language. It is designed by Guido van Rossum in 1991 and developed by Python Software Foundation. Python programming language allows the programmer to write code in fewer lines as compared to another programming language like java, c+ +, c. Python programming language is the first choice of Cybersecurity professional, Data …

Why Is Python The Top Choice Among Cyber Security Professionals? Read More »

SQL Injection by Double Query | securiumsolutions

Image link http://destyy.com/w5qcw4  In today’s blog, I am going to show you the error based SQL injection by Double query.  What is a Double query? A double query SQL injection is nothing but combining two queries into a single query and getting the information through the SQL error message from the database. Union injection can not …

SQL Injection by Double Query | securiumsolutions Read More »