SQL injection

Results: 397



#Item
51Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
52Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
53

BIGINT Overflow Error Based SQL Injection Table of Contents Overview ......................................................................................................................................................

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2015-08-07 13:46:54
    54Ajax / Hacking / Cross-site scripting / JavaScript / JSONP / JSON / HTTP cookie / Code injection / SQL injection / Exploit / Firefox / JQuery

    25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies Ben Stock

    Add to Reading List

    Source URL: ben-stock.de

    Language: English - Date: 2013-09-09 06:37:05
    55

    Atak SQL Injection w aplikacjach Java O mnie • 13 lat doświadczenia w systemach WEB • Developer, Technical Leader, Project Manager

    Add to Reading List

    Source URL: www.data.proidea.org.pl

    - Date: 2013-10-22 12:55:20
      56

      Advanced SQL Injection In SQL Server Applications

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2013-05-02 17:07:01
        57Computing / Cyberwarfare / World Wide Web / Web hosting / Cybercrime / Computer network security / Data management / Phishing / SQL injection / Web hosting service / Internet bot / Computer security

        The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

        Add to Reading List

        Source URL: www2013.wwwconference.org

        Language: English - Date: 2014-07-21 08:47:06
        58Security / Computing / Prevention / Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt

        Application Security Checklist V1.0 Document Audience Application Developers

        Add to Reading List

        Source URL: www.security.uci.edu

        Language: English - Date: 2016-02-23 10:01:01
        59Computer security / Cyberwarfare / Cryptography / Security / Password / Key management / Cross-site request forgery / Crypt / Passwd / SQL injection / Cross-site scripting / Code injection

        Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

        Add to Reading List

        Source URL: ilia.ws

        Language: English - Date: 2015-09-26 04:23:31
        60

        Advanced SQL Injection In SQL Server Applications

        Add to Reading List

        Source URL: inst.eecs.berkeley.edu

        Language: English - Date: 2008-08-26 17:57:09
          UPDATE