Search results
Jump to navigation
Jump to search
- * [[Null byte injection]] * [[SQL injection]] ...1 KB (138 words) - 02:39, 24 November 2022
- ...sages. It is the email equivalent of [[HTTP Header Injection]]. Like [[SQL injection]] attacks, this vulnerability is one of a general class of vulnerabilities ...ttp://www.phpsecure.info/v2/article/MailHeadersInject.en.php Email Headers Injection Using mail() Function] (English) ...2 KB (275 words) - 16:59, 19 June 2024
- ...arget Identification]], an AMD technology for mitigating computer security exploits; * [[Branch Target Injection]] or Spectre variant 2, a security vulnerability ...1 KB (137 words) - 19:49, 27 September 2023
- ...poisoning|web cache poisoning]], and similar [[exploit (computer security)|exploits]]. * [http://wapiti.sf.net Wapiti Open Source XSS, Header, SQL and LDAP injection scanner] ...3 KB (459 words) - 02:34, 8 January 2025
- ...e|binary executables]] are analyzed and modified to protect against common exploits. Binary hardening is independent of compilers and involves the entire [[Lis ...as to prevent attackers from successfully reusing program code to perform exploits. Common hardening techniques are: ...3 KB (339 words) - 06:55, 29 August 2024
- ...exploits.<ref>[http://projects.webappsec.org/Null-Byte-Injection Null Byte Injection] WASC Threat Classification Null Byte Attack section.</ref> * [http://projects.webappsec.org/Null-Byte-Injection Null Byte Injection] WASC Threat Classification Null Byte Attack section ...7 KB (1,119 words) - 11:27, 29 May 2025
- The '''Voyager worm''' is a [[computer worm]] that exploits a SQL injection flaw (CVE-2004-0637) that was posted on the [[Internet]] on October 31, 200 ...2 KB (317 words) - 18:12, 2 January 2025
- ...exploit]]s.<ref name="CWE134"/> Originally thought harmless, format string exploits can be used to [[Crash (computing)|crash]] a program or to execute harmful ...exploits for other software using this method began to surface. The first exploits that brought the issue to common awareness (by providing remote root access ...12 KB (1,754 words) - 06:22, 30 April 2025
- Exploits are designed to identify flaws, bypass security measures, gain unauthorized ...vulnerabilities in applications, networks, operating systems, or hardware. Exploits usually take the form of software or code that aims to take control of comp ...18 KB (2,506 words) - 03:46, 10 November 2025
- ...he injected code will then automatically get executed. This type of attack exploits the fact that most computers (which use a [[Von Neumann architecture]]) do ...as Administrator, SYSTEM, or root. With or without this enhanced control, exploits have the potential to do severe damage or turn the computer into a [[zombie ...11 KB (1,573 words) - 16:35, 4 March 2025
- ...Reuse of existing code, especially when widely distributed, can allow for exploits to be created that target a wider audience than would otherwise be possible ...example, source code written in 1990 is likely to be prone to many [[code injection]] vulnerabilities, because most such problems were not widely understood at ...14 KB (2,001 words) - 07:41, 29 October 2025
- ...bit]] feature (if present) and ridding the attacker of the need to [[Code injection|inject]] their own code. The first example of this attack in the wild was c [[Category:Computer security exploits]] ...5 KB (714 words) - 01:42, 8 November 2024
- {{distinguish|Dependency injection|Arbitrary code execution}} ...]] into the program while it is running. Successful exploitation of a code injection vulnerability can result in [[data breaches]], access to restricted or crit ...29 KB (4,203 words) - 02:01, 24 June 2025
- ...opers later decided to remove HTS easter eggs, as some allowed XSS and SQL exploits and many members submitted false bug reports as a result. ...iewing, proceeded to downplay its risks.<ref>{{cite web|title=howdark.com "exploits"|publisher=phpBB Group|url=http://www.phpbb.com/phpBB/viewtopic.php?p=13162 ...14 KB (1,971 words) - 04:15, 9 May 2025
- ...user interfaces. The developer can do this through the inclusion of [[SQL injection|SQL]], [[PL/SQL]], [[HTML]], [[JavaScript]], or [[CSS]] as well as APEX plu ...h Apex – Part 3 |url=https://content.dsp.co.uk/apex/securing-vulnerability-exploits-apex-part-3 |access-date=2024-10-08 |website=content.dsp.co.uk |language=en ...16 KB (2,124 words) - 11:38, 12 February 2025
- ...ervice]] attacks, more dangerous ones allow the attacker to perform [[code injection]] without the user's awareness.{{sfn|Ablon|Bogart|2017|p=2}} Only a minori ...flow]] exploits, [[buffer underflow]] exploits, and [[boundary condition]] exploits typically take advantage of this category.{{sfn|Garg|Baliyan|2023|p=17}} ...27 KB (3,734 words) - 03:19, 9 June 2025
- ...directory traversal''' (or '''path traversal''') attack [[Security exploit|exploits]] insufficient security validation or sanitization of user-supplied file na ...al characters or strings, such as those that might be used in traversal or injection attacks. [...] Try double-encoding for parts of the input in order to try t ...11 KB (1,526 words) - 11:55, 12 May 2025
- ...sification of SQL injection attack vectors in 2010|A classification of SQL injection attacking vector as of 2010]] ...typed programming language|strongly typed]] and unexpectedly executed. SQL injection is mostly known as an [[attack vector]] for websites but can be used to att ...47 KB (6,473 words) - 11:00, 27 June 2025
- ...in Windows's message-passing system whereby arbitrary code could be [[Code injection|injected]] into any other running application or service in the same sessio [[Category:Computer security exploits]] ...7 KB (1,039 words) - 00:30, 15 July 2024
- ...found in some [[web application]]s. XSS attacks enable attackers to [[code injection|inject]] client-side scripts into web pages viewed by other users. A cross- ...ng data across sites, but gradually started to include other forms of data injection attacks.<ref>{{Cite web |title=Cross Site Scripting Prevention - OWASP Chea ...32 KB (4,609 words) - 21:38, 25 May 2025