LinkedIn Cross-Site-Scripting (XSS) & Content Spoofing Vulnerability
Couple of days back, I reported XSS and Content Spoofing on LinkedIn. Here are the details of the issues. Cross Site Scripting: […]
Couple of days back, I reported XSS and Content Spoofing on LinkedIn. Here are the details of the issues. Cross Site Scripting: […]
SQL injection – one of the most critical vulnerabilities till now – is still included in the OWASP Top 10 […]
Web Application security has become the biggest concern for almost all organizations who wish to bring their business to the […]
What is Fuzzing? Fuzz testing is a testing technique that provides malicious input to the application. Fuzz testing is crashes, […]
Code Analysis Tool (CAT.NET) is a binary source code analysis tool that helps in identifying common security flaws in managed […]
Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) […]
Following is the small example of creating a stored procedure. ==================================================================== CREATE PROC sp_login (@loginid nvarchar(25),@password nvarchar(25)) AS DECLARE @SQLString […]