SQL injection

Results: 397



#Item
291Computer network security / Security / Software testing / Trust seal / Vulnerability / Cross-site scripting / Malware / SQL injection / SecurityMetrics / Cyberwarfare / Computer security / Electronic commerce

Product Description SiteLock helps protect more than just your website; it can protect your business. There have never been more threats to your website business than now. Hackers use malware, SQL Injection, Crosssite sc

Add to Reading List

Source URL: www.sixu.com

Language: English - Date: 2011-10-29 15:26:13
292HTTP response splitting / CWE / Code injection / SQL injection / Cross-site scripting / Improper input validation / Sanitization / XQuery / XML / Computing / Cyberwarfare / Computer security

CWE- 180 INCORRECT BEHAVIOR ORDER: VALIDATE BEFORE CANONICALIZE CWE- 76 FAILURE TO

Add to Reading List

Source URL: faculty.ist.unomaha.edu

Language: English - Date: 2010-06-24 09:59:57
293Cross-platform software / Scripting languages / Relational database management systems / Software testing / Database management systems / Vulnerability / Cross-site scripting / Code injection / SQL injection / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
294Internet protocols / Federated identity / HTTP / Password / Single sign-on / SQL injection / HTTP cookie / Integrated Windows Authentication / Java Authentication and Authorization Service / Computing / Computer security / Security

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael Dalton, Christos Kozyrakis, and Nickolai Zeldovich Computer Systems Laboratory CSAIL Stanford University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
295Data management / HTTP cookie / Cross-site scripting / SQL injection / SQL / Effi / Database trigger / Database / Form / Computing / Software / Database management systems

Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, and Nickolai Zeldovich MIT CSAIL A BSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
296Software bugs / Cross-site request forgery / Cross-site scripting / Buffer overflow / SQL injection / Code injection / Uncontrolled format string / Cyberwarfare / Computer security / Failure

[removed]Uncontrolled Format String 212 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
297Computer network security / OWASP / Improper input validation / Cross-site scripting / SQL injection / Password / Code injection / Uncontrolled format string / Authorization / Computer security / Cyberwarfare / Security

[removed]Improper Null Termination 248 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
298PHP programming language / Relational database management systems / Photo sharing / Piwigo / SQL injection / Vulnerability / SQL / Computing / Software / Data management

Microsoft Word - SOS[removed]doc

Add to Reading List

Source URL: www.senseofsecurity.com.au

Language: English - Date: 2009-08-17 00:09:23
299Cyberwarfare / Payment Card Industry Data Security Standard / Application firewall / SQL injection / Zeus / Internet security / Network security / Information security / Wireless security / Computer network security / Computing / Computer security

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:42:53
300Computer network security / Security / Software testing / OWASP / Cross-site request forgery / Cross-site scripting / SQL injection / Password / Code injection / Computer security / Cyberwarfare / Computing

938 - OWASP Top Ten 2013 Category A10 - Unvalidated Redirects and Forwards[removed]OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
UPDATE