SQL injection

Results: 397



#Item
121Risk / Software testing / Hacking / Cross-site scripting / Cross-site request forgery / Vulnerability / Code injection / Remote file inclusion / SQL injection / Cyberwarfare / Computer security / Failure

Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015

Add to Reading List

Source URL: www.atlassian.com

Language: English - Date: 2015-05-09 18:02:05
122SQL / Data / Databases / Prepared statement / HTTP / SQL injection / Cross-site request forgery / HTTP cookie / Select / Data management / SQL keywords / Computing

Securing PHP Apps By: Ilia Alshanetsky 1 Let Google be our guide!

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2006-11-01 12:26:43
123SQL / Search algorithms / PHP programming language / Procedural programming languages / Code injection / Malware / SQL injection / PHP / Null / Computing / Software engineering / Software

Static Detection of Security Vulnerabilities in Scripting Languages Yichen Xie Alex Aiken Computer Science Department Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2006-05-09 21:01:54
124Cross-platform software / Scripting languages / Relational database management systems / Database management systems / Software testing / Vulnerability / Cross-site scripting / SQL injection / Code injection / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-08-18 12:06:49
125Access control / Two-factor authentication / Password / Authentication / Security token / Transaction authentication number / SQL injection / Pass the hash / One-time password / Security / Computer security / Cryptography

How To Count To Two: What “Two Factor Authentication” Misses Eugene Shablygin, Sergey Bratus February 9, Double, Double Toil and Trouble The Bard

Add to Reading List

Source URL: www.wwpass.com

Language: English - Date: 2015-02-10 16:05:25
126Electronic commerce / Denial-of-service attacks / Computing / Application firewall / Online shopping / Denial-of-service attack / Cross-site scripting / SQL injection / Cyberwarfare / Computer security / Computer network security

CUSTOMER CASE STUDY CLOUD | COLOCATION | MANAGED SERVICES | DATA CENTERS Major online electronics retailer, OneCall, utilizes TierPoint’s security solutions to protect web

Add to Reading List

Source URL: www.tierpoint.com

Language: English - Date: 2015-01-05 17:46:39
127Data management / System administration / Cross-platform software / SQL injection / Su / Secure Shell / Password / Select / MySQL Federated / SQL / Software / MySQL

Securing the stack With a prime focus on securing your database Colin Charles, Community Relations Manager, MySQL AB | http://bytebot.net/blog/

Add to Reading List

Source URL: www.bytebot.net

Language: English - Date: 2008-02-20 22:35:05
128Data management / Cross-platform software / Database management systems / SQL / IBM DB2 / Oracle Database / Stored procedure / SQL injection / Microsoft SQL Server / Relational database management systems / Computing / Software

Improved Penetration Testing of Web Apps and Databases with MatriXay Yuan Fan GCIH,GCIA,CISSP Xiao Rong CISSP,ITIL

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
129Computing / Software testing / Hacking / Cross-site scripting / Cross-site tracing / Vulnerability / Electronic commerce / SQL injection / Web application security / Cyberwarfare / Computer security / Computer network security

Challenges of Automated Web Application Scanning "Why automated scanning only solves half the problem." Black Hat Federal Washington D.C. October 2, 2003 © 2003 by WhiteHat Security, Inc.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
130Data / Prepared statement / SQL injection / Cross-site request forgery / Update / HTTP cookie / From / Code injection / Data management / Computing / SQL

PHP Security Pitfalls By: Ilia Alshanetsky 1 Let Google be our guide!

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2007-05-17 18:38:24
UPDATE