Vivek Gupta

?

Channel Reputation Rank

#366
?

Activity Status

Stale

last updated

According to the data and stats that were collected, 'Vivek Gupta' channel has an excellent rank. Despite such a rank, the feed was last updated more than a year ago. In addition 'Vivek Gupta' includes a significant share of images in comparison to the text content. The channel mostly uses long articles along with sentence constructions of the intermediate readability level, which is a result that may indicate difficult texts on the channel, probably due to a big amount of industrial or scientific terms.

About 'Vivek Gupta' Channel

Pieces of Me

? Updates History Monthly Yearly
? Content Ratio
? Average Article Length

'Vivek Gupta' provides mostly long articles which may indicate the channel’s devotion to elaborated content.

short

long

? Readability Level

'Vivek Gupta' provides texts of a basic readability level which can be quite comfortable for a wide audience to read and understand.

advanced

basic

? Sentiment Analysis

'Vivek Gupta' contains texts with mostly positive attitude and expressions (e.g. it may include some favorable reviews or words of devotion to the subjects addressed on the channel).

positive

negative

Recent News

Unfortunately Vivek Gupta has no news yet.

But you may check out related channels listed below.

DealsAndYou, why you no sanitize inputs?

[...] XSS Locator code snippet. Voila!, an alert box popped up confirming my hunch. Click to see full-size image. For those who don’t know what XSS (Cross-site scripting) attack means, here’s an [...]

KoolKart.com, get Kooler by sanitizing your input

[...] returned by injected code (cookie-stealer.php). The code is self explanatory. It gets the cookie information via querystring, saves it to a text file and redirects back to koolkart. Step 2 – [...]

DealsAndYou, why you no sanitize inputs?

[...] attack, next steps were: Injecting a javascript snippet into the web page which steals the cookie information. Sending this cookie information to a remote server and storing it. Using this stored [...]

Hey Snapdeal – You’ve got a XSS vulnerability [Fixed]

[...] a mail from snapdeal security team, and this vulnerability has been fixed. I just found a XSS vulnerability on a very popular Indian e-commerce site snapdeal.com. It was a bit tricky to find the XSS [...]

XSS vulnerability found on shop.airtel.com

[...] I was randomly browsing through shop.airtel.com and discovered a XSS vulnerability. This involves one of the simplest forms of XSS attack, known as end title tag attack. [...]

KoolKart.com, get Kooler by sanitizing your input

[...] Earlier, I demonstrated the XSS vulnerability in DealsAndYou (fixed) and now, I’ll demo a XSS bug on KoolKart.com. I’ [...]

DealsAndYou, why you no sanitize inputs?

[...] into the web page which steals the cookie information. Sending this cookie information to a remote server and storing it. Using this stored cookie information to login into the system without any [...]

KoolKart.com, get Kooler by sanitizing your input

[...] the javascript injection script. The above code gets the cookie and sends it to the remote server with cookie information as query string. Step 3 – Finding the XSS pattern. It took [...]

Hey Snapdeal – You’ve got a XSS vulnerability [Fixed]

[...] on a very popular Indian e-commerce site snapdeal.com. It was a bit tricky to find the XSS pattern, because searching for a string containing some  javascript functions such as “alert( [...]

KoolKart.com, get Kooler by sanitizing your input

[...] it to the remote server with cookie information as query string. Step 3 – Finding the XSS pattern. It took me a couple of tries to find the vulnerable javascript code KoolKart. I realized that [...]

Popular (and not so popular) Indian E-commerce websites with XSS vulnerabilities

[...] I was going though few Indian e-commerce websites and found XSS vulnerabilities in few of them. I’m not publishing injection patterns due to security reasons. If [...]

DealsAndYou, why you no sanitize inputs?

[...] simple reason. The input wasn’t sanitized properly. 1.5 years ago, I found similar XSS vulnerabilities in Flipkart and infibeam as well. See the screenshots below. Click to see full- [...]

Simple way to detect ad blocking extensions/addons (and monetizing without ads)

[...] script tags in the webpage itself, to detect if the file was blocked from loading: The above code snippet simply checks whether the variable was defined or not. If it wasn’t, it simply means [...]

DealsAndYou, why you no sanitize inputs?

[...] me do a XSS vulnerability test on their “Search” input box using the XSS Locator code snippet. Voila!, an alert box popped up confirming my hunch. Click to see full-size image. For those [...]

DealsAndYou, why you no sanitize inputs?

[...] value, it just redirects back to DealsAndYou. Nothing fancy. Step 2 – Writing the javascript injection script. The above javascript code is quite simple as well. It gets the cookie and redirects [...]

KoolKart.com, get Kooler by sanitizing your input

[...] , saves it to a text file and redirects back to koolkart. Step 2 – Writing the javascript injection script. The above code gets the cookie and sends it to the remote server with cookie [...]

?Key Phrases
DealsAndYou, why you no sanitize inputs?

[...] XSS Locator code snippet. Voila!, an alert box popped up confirming my hunch. Click to see full-size image. For those who don’t know what XSS (Cross-site scripting) attack means, here’s an [...]

Related channels