SQL injection

Results: 397



#Item
281Computer network security / Software testing / Cross-site request forgery / Cross-site scripting / ASP.NET / SQL injection / Code injection / Vulnerability / Computer security / Computing / Cyberwarfare / Software

.NET Threats & Countermeasures Hands-on Training (2 Days) Course description Secure programming is the best defense against hackers. This multilayered Hands on course will demonstrate live real time hacking methods , ana

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-11 09:56:52
282Failure / Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / CVSS / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter of[removed]January – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-09-02 22:11:32
283Relational database management systems / SQL / Command shells / Computer configuration / Environment variable / Batch file / SQL injection / Run command / Command Prompt / Computing / Software / Scripting languages

Microsoft Word - Blind SQL injection discovery.doc

Add to Reading List

Source URL: blueinfy.com

Language: English - Date: 2014-09-26 06:29:52
284Failure / Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / CVSS / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Reporting Status of Vulnerability-related Information about Software Products and Websites - 2nd Quarter of[removed]April – June) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Respon

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-09-02 22:11:32
285Cross-platform software / Scripting languages / Relational database management systems / Database management systems / Software testing / Vulnerability / Cross-site scripting / SQL injection / Code injection / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2014-09-23 03:33:32
286Malware / Software testing / Microsoft Windows / Computer network security / DLL injection / Code injection / Vulnerability / SQL injection / Dynamic-link library / Cyberwarfare / Computing / Computer security

Trace: Tennessee Research and Creative Exchange Masters Theses University of Tennessee 

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2010-08-19 15:52:37
287Snippet / Source code / SQL / Join / Computing / Computer programming / Data management

Type-Specific Languages to Fight Injection Attacks Darya Kurilova Cyrus Omar Ligia Nistor

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2014-07-31 03:05:11
288Oracle Database / Oracle Corporation / 11i / Metalink / Patch / Software / Computing / Cross-platform software

Oracle Security Alert #61 Dated: 3 November 2003 Updated 13 November 2003 Severity: 1 SQL Injection Vulnerability in Oracle9i Application Server

Add to Reading List

Source URL: www.oracle.com

Language: English
289Computing / Software testing / Security / OWASP / Penetration test / Web application security / Application security / SQL injection / Vulnerability / Computer security / Cyberwarfare / Computer network security

HTTP Parameter Pollution Luca Carettoni Independent Researcher [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:43
290Computer network security / Software testing / Data management / SQL / SQL injection / Vulnerability / Code injection / Email injection / Acunetix / Computer security / Cyberwarfare / Computing

Finding the right web application scanner

Add to Reading List

Source URL: www.acunetix.com

Language: English - Date: 2014-10-01 07:15:40
UPDATE