Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for SQL injection
    In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into...
    47 KB (4,983 words) - 10:03, 1 May 2025
  • Thumbnail for Dependency injection
    In software engineering, dependency injection is a programming technique in which an object or function receives other objects or functions that it requires...
    35 KB (3,536 words) - 21:17, 30 March 2025
  • executes the injected text as code. Injection flaws are often found in services like Structured Query Language (SQL) databases, Extensible Markup Language...
    29 KB (3,107 words) - 05:58, 25 May 2025
  • repeatedly without re-compiling security, by reducing or eliminating SQL injection attacks A prepared statement takes the form of a pre-compiled template...
    16 KB (1,814 words) - 12:44, 30 April 2025
  • Buffer overflow Cross-site scripting Directory traversal Null byte injection SQL injection Uncontrolled format string "CWE-20: Improper Input Validation"...
    1 KB (109 words) - 02:39, 24 November 2022
  • schemes and security filters against code injection, directory traversal, cross-site scripting (XSS) and SQL injection. In double encoding, data is encoded...
    14 KB (1,869 words) - 12:24, 26 March 2025
  • Thumbnail for Wargame (hacking)
    of software (often JavaScript, C and assembly language), code injection, SQL injections, cross-site scripting, exploits, IP address spoofing, forensics...
    4 KB (326 words) - 12:13, 2 June 2024
  • directly have. Some protection from SQL injection attacks Stored procedures can be used to protect against injection attacks. Stored procedure parameters...
    12 KB (1,298 words) - 23:08, 5 November 2024
  • credentials. SQL injection, a similar malicious attack method Alonso, J. M.; Bordon, R.; Beltran, M.; Guzman, A. (1 November 2008). "LDAP injection techniques"...
    3 KB (403 words) - 15:12, 2 September 2024
  • injection, a software testing technique Network injection, an attack on access points that are exposed to non-filtered network traffic SQL injection,...
    2 KB (288 words) - 17:12, 27 March 2022
  • vulnerabilities and is intended for educational purposes. Cross site scripting SQL injection Porup, J. M. (2018-11-09). "Learn to play defense by hacking these broken...
    1 KB (89 words) - 11:08, 9 March 2025
  • Thumbnail for MariaDB
    MariaDB (redirect from SkySQL)
    MariaDB is a community-developed, commercially supported fork of the MySQL relational database management system (RDBMS), intended to remain free and...
    45 KB (3,332 words) - 13:45, 15 May 2025
  • This allows a threat actor to access sensitive data. SQL Injections SQL injection is a code injection technique used by threat actors to attack any data-driven...
    17 KB (2,007 words) - 13:02, 21 May 2025
  • Thumbnail for Sqlmap
    sqlmap is a software utility for automated discovering of SQL injection vulnerabilities in web applications. The tool was used in the 2015 data breach...
    3 KB (160 words) - 14:51, 24 March 2025
  • associated with web sites which are attacked using techniques such as SQL injection or buffer overflow attack approaches. The concept behind taint checking...
    6 KB (715 words) - 12:49, 30 April 2025
  • Thumbnail for WordPress
    the Yoast SEO plugin was vulnerable to SQL injection, allowing attackers to potentially execute arbitrary SQL commands. The issue was fixed in version...
    88 KB (6,198 words) - 18:36, 23 May 2025
  • static DTD and disallow any declared DTD included in the XML document. SQL injection Billion laughs attack "What Are XML External Entity (XXE) Attacks"....
    8 KB (837 words) - 17:27, 27 March 2025
  • send email messages. It is the email equivalent of HTTP Header Injection. Like SQL injection attacks, this vulnerability is one of a general class of vulnerabilities...
    2 KB (225 words) - 16:59, 19 June 2024
  • affect APEX applications are SQL injection and cross-site scripting (XSS). SQL Injection APEX applications inherently use PL/SQL constructs as the base server-side...
    16 KB (1,459 words) - 11:38, 12 February 2025
  • Thumbnail for Adminer
    Adminer (category MySQL)
    Ukrainian, Vietnamese) SQL syntax highlighting Visual database/E-R schema editing Countermeasures against XSS, CSRF, SQL injection, session-stealing, ....
    4 KB (373 words) - 20:09, 24 February 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)