SQL injection

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTsICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

10 years ago
More than 1 Million WordPress websites are vulnerable to blind SQL Injection AttacksMore than 1 Million WordPress websites are vulnerable to blind SQL Injection Attacks

More than 1 Million WordPress websites are vulnerable to blind SQL Injection Attacks

A security bug in the WordPress plugin WP-Slimstat could be exploited by attackers to discover a “secret” key and use…

10 years ago
Drupal community under attack due to a critical SQL injection flawDrupal community under attack due to a critical SQL injection flaw

Drupal community under attack due to a critical SQL injection flaw

A security advisory issued by Drupal assumes that every installation of the popular CMS based in the version 7.x was…

11 years ago
WAAR report – Web Attacks continue to increase, especially those launched from Amazon serversWAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks…

11 years ago
Yahoo Contributors Network affected by Blind & Time Based SQL Injection flawsYahoo Contributors Network affected by Blind & Time Based SQL Injection flaws

Yahoo Contributors Network affected by Blind & Time Based SQL Injection flaws

Yahoo! Contributors Network was affected by a serious Time based Blind SQL Injection vulnerability which allows the theft of sensitive…

11 years ago
Yahoo SQL Injection flaw allows Remote Code Execution and privileges scalationYahoo SQL Injection flaw allows Remote Code Execution and privileges scalation

Yahoo SQL Injection flaw allows Remote Code Execution and privileges scalation

The Egyptian hacker Ebrahim Hegazy has discovered a critical Yahoo SQL Injection flaw exploitable to Remote Code Execution and privilege…

11 years ago
Nice Recording eXpress lawful intercept solution is flawedNice Recording eXpress lawful intercept solution is flawed

Nice Recording eXpress lawful intercept solution is flawed

Researchers at SEC Consult Vulnerability Lab discovered that Nice Recording eXpress lawful intercept software contains numerous flaws, including a backdoor.…

11 years ago
Ponemon study – SQL Injection attacks too dangerous for organizationsPonemon study – SQL Injection attacks too dangerous for organizations

Ponemon study – SQL Injection attacks too dangerous for organizations

A new study conducted by the Ponemon Institute reveals the impact of successfully SQL injection attacks on organizations during the…

11 years ago
Flickr affected by critical SQL Injection and Remote Code Execution bugsFlickr affected by critical SQL Injection and Remote Code Execution bugs

Flickr affected by critical SQL Injection and Remote Code Execution bugs

The security expert Ibrahim Raafat discovered critical SQL injection vulnerabilities in Flickr Photo Books which allow attackers to gain complete…

11 years ago
German researcher found remote code execution flaw on EBay subdomainGerman researcher found remote code execution flaw on EBay subdomain

German researcher found remote code execution flaw on EBay subdomain

The German security researcher David Vieira-Kurz discovered a critical vulnerability in the Ebay website that allows an attacker a remote code…

12 years ago