Skip to content
  • Home
  • Blog
  • Our Services
  • About
  • Contact
  • Pricing
Blog
  • Home
  • Blog
  • Our Services
  • About
  • Contact
  • Pricing
Blog
  • Ethical Hacking

Lab : Exploiting Stored XSS into Anchor `href` Attribute with Double Quotes HTML-Encoded 

Introduction:  In this post, we’ll explore a Stored Cross-Site Scripting (XSS) vulnerability where malicious…

  • Adm1n
  • December 5, 2025
  • Ethical Hacking

Lab: Exploiting Reflected XSS into Attribute with Angle Brackets HTML-Encoded 

Introduction  In this post, we’ll dissect a common Cross-Site Scripting (XSS) vulnerability…

  • Adm1n
  • November 26, 2025
  • Ethical Hacking

Lab : DOM XSS in jQuery Selector Sink Using a `hashchange` Event

Vulnerability Type: DOM-based Cross-Site Scripting (XSS)    Attack Vector  The vulnerable application uses jQuery…

  • Adm1n
  • November 26, 2025
  • Ethical Hacking

Lab: Exploiting Stored XSS into Anchor `href` Attribute with Double Quotes HTML-Encoded 

Introduction:  In this post, we’ll explore a Stored Cross-Site Scripting (XSS) vulnerability…

  • Adm1n
  • November 13, 2025
  • Ethical Hacking

Lab: Exploiting Reflected XSS into Attribute with Angle Brackets HTML-Encoded 

Introduction  In this post, we’ll dissect a common Cross-Site Scripting (XSS) vulnerability…

  • Adm1n
  • November 13, 2025
  • Cyber Threats

Lab: DOM XSS in jQuery Selector Sink Using a `hashchange` Event 

Vulnerability Type: DOM-based Cross-Site Scripting (XSS)    Attack Vector  The vulnerable application uses…

  • Adm1n
  • November 6, 2025
  • Ethical Hacking

Lab: DOM XSS in jQuery Anchor `href` Attribute Sink Using `location.search` Source

Vulnerability Type: DOM-based Cross-Site Scripting (XSS)  Attack Vector The vulnerable application dynamically…

  • Adm1n
  • October 25, 2025
Prev
1 2 3 4 5 6 7 8
Next

Live Search

No results

Posts

Lab: Username Enumeration via Subtly Different Responses 

February 6, 2026

Building Your Career: In-Demand Cybersecurity Skills to Learn Now

August 20, 2025

The Rise of AI-Powered Cyber Attacks: How to Stay Ahead of Hackers

August 20, 2025

Proven Cybersecurity Home Lab Setup: VMware, Kali Linux & Vulnerable Machines

August 27, 2025

HTTP Requests & Status Codes Explained for Beginners

September 2, 2025

Categories

  • Career
  • Cloud Security
  • Cyber Threats
  • Ethical Hacking
  • Uncategorized

Trending now

Lab: Username Enumeration via Subtly Different Responses 
Building Your Career: In-Demand Cybersecurity Skills to Learn Now
The Rise of AI-Powered Cyber Attacks: How to Stay Ahead of Hackers
Proven Cybersecurity Home Lab Setup: VMware, Kali Linux & Vulnerable Machines

We provide innovative IT solutions and cybersecurity services to empower businesses and individuals globally

Navigation

  • Main Page
  • Privacy Policy

Contact Info

  • Address: No. 47 Kanta Road by Independence Way, Kaduna.
  • Phone: +234 7044621230
  • Email: info@apexiumtechnologies.com

Copyright © 2026 - Apexium Technologies Ltd.