SQL injection

Results: 397



#Item
51Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
52Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
53BIGINT Overflow Error Based SQL Injection Table of Contents Overview ......................................................................................................................................................

BIGINT Overflow Error Based SQL Injection Table of Contents Overview ......................................................................................................................................................

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2015-08-07 13:46:54
    5425 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies Ben Stock

    25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies Ben Stock

    Add to Reading List

    Source URL: ben-stock.de

    Language: English - Date: 2013-09-09 06:37:05
    55Atak SQL Injection w aplikacjach Java  O mnie • 13 lat doświadczenia w systemach WEB • Developer, Technical Leader, Project Manager

    Atak SQL Injection w aplikacjach Java O mnie • 13 lat doświadczenia w systemach WEB • Developer, Technical Leader, Project Manager

    Add to Reading List

    Source URL: www.data.proidea.org.pl

    - Date: 2013-10-22 12:55:20
      56Advanced SQL Injection In SQL Server Applications

      Advanced SQL Injection In SQL Server Applications

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2013-05-02 17:07:01
        57The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

        The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

        Add to Reading List

        Source URL: www2013.wwwconference.org

        Language: English - Date: 2014-07-21 08:47:06
        58Security / Computing / Prevention / Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt

        Application Security Checklist V1.0 Document Audience Application Developers

        Add to Reading List

        Source URL: www.security.uci.edu

        Language: English - Date: 2016-02-23 10:01:01
        59Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863  whois: Ilia Alshanetsky

        Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

        Add to Reading List

        Source URL: ilia.ws

        Language: English - Date: 2015-09-26 04:23:31
        60Advanced SQL Injection In SQL Server Applications

        Advanced SQL Injection In SQL Server Applications

        Add to Reading List

        Source URL: inst.eecs.berkeley.edu

        Language: English - Date: 2008-08-26 17:57:09