File inclusion vulnerability

Results: 11



#Item
1User interface techniques / Cross-platform software / PHP / SQL / Form / World Wide Web / MySQLi / Database / MySQL / Prepared statement / Web application / File inclusion vulnerability

Published by S&S Media Group October 2012 Issue 7 Also in this issue

Add to Reading List

Source URL: entwickler.de

Language: English - Date: 2015-01-21 09:26:18
2Failure / Cross-site scripting / Vulnerability / SQL injection / Fault injection / Dolev-Yao model / Model-based testing / Remote file inclusion / Code injection / Software testing / Cyberwarfare / Computer security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2012-10-11 06:26:07
3Cross-platform software / Scripting languages / Remote file inclusion / Hacking / Software testing / SQL injection / HTTP cookie / PHP / Vulnerability / Computing / Software engineering / Computer security

Sept 2013 Hacker Intelligence Initiative, Monthly Trend Report #17 PHP SuperGlobals: Supersized Trouble 1. Executive Summary For a while now, the ADC research group has been looking into the implication of third-party ap

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2013-09-03 13:41:37
4Computer network security / Software testing / Cross-site scripting / Vulnerability / Acunetix / Rapid7 / Remote file inclusion / Qualys / Cross-site request forgery / Computer security / Cyberwarfare / Computing

State of the Art: Automated Black-Box Web Application Vulnerability Testing Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell Stanford University Stanford, CA {jbau, divijg}@stanford.edu, {elie, mitchell}@cs.stanford

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:31:25
5PHP programming language / PHP / Data URI scheme / Hacker / Include directive / Imperva / Web application / Include vulnerability / Computing / Software engineering / Remote file inclusion

April 2012 Hacker Intelligence Initiative, Monthly Trend Report #8 Remote and Local File Inclusion Vulnerabilities 101 And the Hackers Who Love Them 1. Executive Summary

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2012-03-30 14:02:14
6Risk / Software testing / Hacking / Cross-site scripting / Cross-site request forgery / Vulnerability / Code injection / Remote file inclusion / SQL injection / Cyberwarfare / Computer security / Failure

Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015

Add to Reading List

Source URL: www.atlassian.com

Language: English - Date: 2015-05-09 18:02:05
7Procedural programming languages / Scripting languages / Software testing / Hacking / PHP / Vulnerability / Cross-site scripting / Remote file inclusion / Lex / Computing / Software / Cross-platform software

RIPS A static source code analyser for vulnerabilities in PHP scripts NDS Seminar

Add to Reading List

Source URL: websec.files.wordpress.com

Language: English - Date: 2010-12-04 13:43:05
8Directory traversal attack / Ruby on Rails / Vulnerability / Remote file inclusion / CVSS / Glob / Exploit / Arbitrary code execution / Secure Shell / Cyberwarfare / Computing / Software

1 THE ANATOMY OF A RAILS VULNERABILITY The Anatomy of a Rail s Vulnerabil i ty C V E[removed]: Fro m Direc t o ry Trave rsal to S he ll May 27th, [removed]Jeff Jarmoc - [removed]

Add to Reading List

Source URL: matasano.com

Language: English - Date: 2014-12-15 11:36:45
9Computing / Honeypot / Remote file inclusion / Vulnerability / Denial-of-service attack / Exploit / Hacker / Malware / Client honeypot / Computer network security / Cyberwarfare / Computer security

T H E H O N E Y N E T P R O J E C T ® | KYT Paper Know Your Tools: A dynamic, low-interaction web application honeypot The Honeynet Project

Add to Reading List

Source URL: www.honeynet.org

Language: English - Date: 2014-01-06 14:17:05
10Computer network security / Software testing / Cross-site scripting / Vulnerability / SQL injection / Application security / Remote file inclusion / Web application security / Web application security scanner / Computer security / Cyberwarfare / Failure

Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners David A. Shelly Thesis submitted to the Faculty of the

Add to Reading List

Source URL: scholar.lib.vt.edu

Language: English - Date: 2010-08-10 18:47:47
UPDATE