Remote file inclusion

Results: 16



#Item
1Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2012-10-11 06:26:07
2Detecting remote file inclusion attacks Or Katz Breach Security

Detecting remote file inclusion attacks Or Katz Breach Security

Add to Reading List

Source URL: www.owasp.org

- Date: 2011-12-11 14:42:55
    3Sept 2013 Hacker Intelligence Initiative, Monthly Trend Report #17 PHP SuperGlobals: Supersized Trouble 1. Executive Summary For a while now, the ADC research group has been looking into the implication of third-party ap

    Sept 2013 Hacker Intelligence Initiative, Monthly Trend Report #17 PHP SuperGlobals: Supersized Trouble 1. Executive Summary For a while now, the ADC research group has been looking into the implication of third-party ap

    Add to Reading List

    Source URL: www.imperva.com

    Language: English - Date: 2013-09-03 13:41:37
    4Securing the PHP Environment with PHPSecInfo Ed Finkler

    Securing the PHP Environment with PHPSecInfo Ed Finkler

    Add to Reading List

    Source URL: funkatron.com

    Language: English - Date: 2007-11-19 22:45:30
    5Secure PHP Development with Inspekt Ed Finkler <> DC PHP Conference –   Be afraid

    Secure PHP Development with Inspekt Ed Finkler <> DC PHP Conference – Be afraid

    Add to Reading List

    Source URL: funkatron.com

    Language: English - Date: 2007-11-19 22:34:38
    6State of the Art: Automated Black-Box Web Application Vulnerability Testing Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell Stanford University Stanford, CA {jbau, divijg}@stanford.edu, {elie, mitchell}@cs.stanford

    State of the Art: Automated Black-Box Web Application Vulnerability Testing Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell Stanford University Stanford, CA {jbau, divijg}@stanford.edu, {elie, mitchell}@cs.stanford

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2010-03-09 17:31:25
    7Source Code Analysis in PHP Joseph Giron  This paper is divided into 5 sections. Section 1: PHP basics Section 2: Tools to use

    Source Code Analysis in PHP Joseph Giron This paper is divided into 5 sections. Section 1: PHP basics Section 2: Tools to use

    Add to Reading List

    Source URL: www.gironsec.com

    Language: English - Date: 2011-08-11 17:53:22
    8April 2012 Hacker Intelligence Initiative, Monthly Trend Report #8 Remote and Local File Inclusion Vulnerabilities 101 And the Hackers Who Love Them  1. Executive Summary

    April 2012 Hacker Intelligence Initiative, Monthly Trend Report #8 Remote and Local File Inclusion Vulnerabilities 101 And the Hackers Who Love Them 1. Executive Summary

    Add to Reading List

    Source URL: www.imperva.com

    Language: English - Date: 2012-03-30 14:02:14
    9Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015

    Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015

    Add to Reading List

    Source URL: www.atlassian.com

    Language: English - Date: 2015-05-09 18:02:05
    10RIPS  A static source code analyser for vulnerabilities in PHP scripts  NDS Seminar

    RIPS A static source code analyser for vulnerabilities in PHP scripts NDS Seminar

    Add to Reading List

    Source URL: websec.files.wordpress.com

    Language: English - Date: 2010-12-04 13:43:05