Vulnerabilities are weaknesses or flaws in a system, network, application, or process that can be exploited by a threat actor (such as a hacker) to gain unauthorized access, disrupt services, or compromise data.
Authentication-based Vulnerability
An authentication-based vulnerability refers to a weakness in the process of verifying a user’s, device’s, or system’s identity.
These flaws allow attackers to bypass login systems, impersonate users, or gain unauthorized access to sensitive resources.
1: Open the TestFire website for testing.
Website: https://demo.testfire.net/login.jsp
2: Try this Syntax.
Syntax: 1′ OR ‘1’=’1
