Code injection

Results: 406



#Item
71Uniform resource locator / Cross-site scripting / HTTP cookie / JavaScript / Form / HTTP referer / Web server / Cross-site request forgery / Code injection / Computing / World Wide Web / Cyberwarfare

Advanced Cross Site Scripting by Gavin Zuchlinski http://libox.net Table of Contents

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2003-10-20 16:21:38
72PHP programming language / World Wide Web / Initialisms / PHP / Form / HTTP cookie / Vulnerability / Code injection / Session poisoning / Computing / Software / Computer security

Auditing & Securing PHP Applications By: Ilia Alshanetsky 1

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2006-04-26 11:50:36
73Data / Prepared statement / SQL injection / Cross-site request forgery / Update / HTTP cookie / From / Code injection / Data management / Computing / SQL

PHP Security Pitfalls By: Ilia Alshanetsky 1 Let Google be our guide!

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2007-05-17 18:38:24
74PHP programming language / World Wide Web / Initialisms / PHP / Form / Vulnerability / HTTP cookie / Code injection / Session poisoning / Computing / Software / Computer security

PHP Security By: Ilia Alshanetsky What is Security?  

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2006-04-01 15:17:25
75SQL injection / MongoDB / BSON / NoSQL / SQL / Document-oriented database / Penetration test / JSON / Data management / Computing / Data

(in)Secure code, Exploits and mitigation AngularJS and MongoDB Israel Chorzevski Tech leader, AppSec Labs

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-09 03:51:21
76Scripting languages / Computer network security / Software testing / Code injection / Machine code / Malware / Metasploit Project / Batch file / Echo / Computing / Software / System software

Microsoft Word - Advanced Command Injection Exploitation-1.doc

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
77APK / Embedded Linux / Smartphones / JAR / Code injection / Computer architecture / Computing / Software / Android

Reverse Engineering Android: Disassembly & Code Injection Thanasis Petsas - www.syssec-project.eu

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-26 08:37:42
78Software testing / Code injection / Machine code / Malware / Vulnerability / Unix / Nm / At / Vi / Computing / Software / System software

Microsoft PowerPoint - Advanced Command Injection Exploitation[1].ppt [Compatibility Mode]

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
79Malware / Software bugs / Shellcode / Antivirus software / Buffer overflow / Computer virus / Code injection / Portable Executable / Hooking / Cyberwarfare / Computer security / Failure

WiShMaster Windows Shellcode Mastery BlackHat EuropeBenjamin CAILLAT

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
80Data / Relational database management systems / Database management systems / Subroutines / SQL injection / Stored procedure / Vulnerability / Code injection / Magic quotes / Data management / Computing / SQL

VISA Europe SQL Injection Attacks Data has become the preferred currency of today’s card criminals. Their aim is to obtain sensitive personal and account data. And, with so many online retailers routinely collecting an

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:45
UPDATE