Code injection

Results: 406



#Item
41Computing / Vulnerability / Fuzz testing / Coverity / Cross-site scripting / Test automation / Code injection / C / Software testing / Computer security / Cyberwarfare

Reference table from Section 2a of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:15
42Social engineering / Cross-site scripting / FTP clients / News aggregators / Phishing / JavaScript / Google Chrome / Code injection / Internet Explorer / Software / Computing / Human–computer interaction

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D5.4

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2014-05-11 17:31:14
43Cross-site scripting / HTTP / HTTP cookie / JavaScript / SQL injection / Form / Cross-site request forgery / Code injection / Cyberwarfare / Computing / Computer security

The Anato my of Cross Site Scripting Anatomy, Discovery, Attack, Exploitation by Gavin Zuchlinski ( ) http://libox.net/ November 5, 2003

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2003-11-06 15:38:22
44X86 architecture / Computing / Assembly languages / Microcontrollers / X86 assembly language / CPUID / Computer architecture / Linux kernel / System.map

Malicious Code Injection via /dev/mem Anthony Lineberry <> March 27, 2009 Abstract In this paper we will discuss methods for using the character device, /dev/mem, as an entry point for injectin

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
45Cross-site scripting / Computer network security / Cross-site request forgery / HTTP / Software testing / Code injection / JavaScript / SQL injection / Vulnerability / Cyberwarfare / Computer security / Computing

Kentico CMS – Security White Paper Kentico CMS Security White Paper Dominik Pinter

Add to Reading List

Source URL: devnet.kentico.com

Language: English - Date: 2011-07-23 12:32:44
46Software testing / Software optimization / Hacking / Vulnerability / Code injection / Instrumentation / Anomaly detection / Computing / Computer security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:35:47
47Software bugs / Central processing unit / NX bit / Buffer overflow / NX technology / Data Execution Prevention / Operating system / Black Hat Briefings / Code injection / Computer security / Software / Computing

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
48Espionage / Backdoor / Rootkit / Code injection / Veracode / Loadable kernel module / Hooking / Eval / Self-modifying code / Malware / System software / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
49Computer security / Cyberwarfare / Data / Penetration test / Database management systems / Code injection / SQL / Data management / SQL injection

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
50System software / Lightweight Directory Access Protocol / OpenLDAP / SQL injection / Code injection / Active Directory / Json2Ldap / Watermark / Directory services / Computing / Software

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:30
UPDATE