SQL INJECTION JAVASCRIPT BLACKLIST |
2008-05-20 | Raul Siles | List of malicious domains inserted through SQL injection |
SQL |
2020-07-30/a> | Johannes Ullrich | Python Developers: Prepare!!! |
2018-02-08/a> | Bojan Zdrnja | SQL injection and division by zero exceptions |
2017-08-07/a> | Xavier Mertens | Increase of phpMyAdmin scans |
2017-08-02/a> | Bojan Zdrnja | Attacking NoSQL applications (part 2) |
2017-04-26/a> | Johannes Ullrich | If there are some unexploited MSSQL Servers With Weak Passwords Left: They got you now (again) |
2016-12-06/a> | Bojan Zdrnja | Attacking NoSQL applications |
2016-08-11/a> | Pasquale Stirparo | Looking for the insider: Forensic Artifacts on iOS Messaging App |
2016-06-03/a> | Tom Liston | MySQL is YourSQL |
2016-04-27/a> | Tom Webb | Kippos Cousin Cowrie |
2016-02-15/a> | Bojan Zdrnja | Exploiting (pretty) blind SQL injections |
2013-10-19/a> | Johannes Ullrich | Yet Another WHMCS SQL Injection Exploit |
2013-07-16/a> | Johannes Ullrich | Why don't we see more examples of web app attacks via POST? |
2013-04-04/a> | Johannes Ullrich | Postgresql Patches Critical Vulnerability |
2013-03-03/a> | Richard Porter | Uptick in MSSQL Activity |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2013-01-09/a> | Rob VandenBrink | SQL Injection Flaw in Ruby on Rails |
2012-12-02/a> | Guy Bruneau | Zero Day MySQL Buffer Overflow |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-09-21/a> | Guy Bruneau | Storing your Collection of Malware Samples with Malwarehouse |
2012-07-31/a> | Daniel Wesemann | SQL injection, lilupophilupop-style |
2012-06-11/a> | Johannes Ullrich | Exploit Available for Trivial MySQL Password Bypass |
2011-12-01/a> | Mark Hofman | SQL Injection Attack happening ATM |
2011-06-06/a> | Johannes Ullrich | The Havij SQL Injection Tool |
2011-04-19/a> | Bojan Zdrnja | SQL injection: why can’t we learn? |
2011-04-01/a> | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2010-12-02/a> | Kevin Johnson | SQL Injection: Wordpress 3.0.2 released |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Obfuscated SQL Injection attacks |
2010-05-21/a> | Rick Wanner | MySQL 5.1.47 is now available - http://www.mysql.com/downloads/mysql/ |
2010-05-16/a> | Rick Wanner | Upcoming MySQL patch fixes several critical vulnerabilites |
2009-07-16/a> | Bojan Zdrnja | OWC exploits used in SQL injection attacks |
2009-05-19/a> | Bojan Zdrnja | Advanced blind SQL injection (with Oracle examples) |
2009-05-09/a> | Patrick Nolan | Shared SQL Injection Lessons Learned blog item |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-02-11/a> | Robert Danford | ProFTPd SQL Authentication Vulnerability exploit activity |
2008-12-23/a> | Patrick Nolan | MS ACK's Vulnerability in SQL Server which Could Allow Remote Code Execution |
2008-12-15/a> | Toby Kohlenberg | New MS SQL Server vulnerability |
2008-12-12/a> | Johannes Ullrich | MSIE 0-day Spreading Via SQL Injection |
2008-12-01/a> | Jason Lam | Input filtering and escaping in SQL injection mitigation |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
2008-09-29/a> | Daniel Wesemann | ASPROX mutant |
2008-09-01/a> | John Bambenek | The Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months |
2008-08-23/a> | Mark Hofman | SQL injections - an update |
2008-08-08/a> | Mark Hofman | More SQL Injections - very active right now |
2008-07-24/a> | Bojan Zdrnja | What's brewing in Danmec's pot? |
2008-06-30/a> | Marcus Sachs | More SQL Injection with Fast Flux hosting |
2008-06-24/a> | Jason Lam | SQL Injection mitigation in ASP |
2008-06-24/a> | Jason Lam | Microsoft SQL Injection Prevention Strategy |
2008-06-23/a> | donald smith | Preventing SQL injection |
2008-06-13/a> | Johannes Ullrich | SQL Injection: More of the same |
2008-05-20/a> | Raul Siles | List of malicious domains inserted through SQL injection |
2008-04-24/a> | donald smith | Hundreds of thousands of SQL injections |
2008-04-16/a> | Bojan Zdrnja | The 10.000 web sites infection mystery solved |
2008-03-14/a> | Kevin Liston | 2117966.net-- mass iframe injection |
2008-01-09/a> | Bojan Zdrnja | Mass exploits with SQL Injection |
2007-02-24/a> | Jason Lam | Prepared Statements and SQL injections |
INJECTION |
2020-11-19/a> | Xavier Mertens | PowerShell Dropper Delivering Formbook |
2020-09-24/a> | Xavier Mertens | Party in Ibiza with PowerShell |
2020-08-28/a> | Xavier Mertens | Example of Malicious DLL Injected in PowerShell |
2020-07-30/a> | Johannes Ullrich | Python Developers: Prepare!!! |
2019-09-06/a> | Xavier Mertens | PowerShell Script with a builtin DLL |
2018-09-28/a> | Xavier Mertens | More Excel DDE Code Injection |
2018-09-05/a> | Xavier Mertens | Malicious PowerShell Compiling C# Code on the Fly |
2018-02-08/a> | Bojan Zdrnja | SQL injection and division by zero exceptions |
2017-05-05/a> | Xavier Mertens | HTTP Headers... the Achilles' heel of many applications |
2016-02-15/a> | Bojan Zdrnja | Exploiting (pretty) blind SQL injections |
2013-10-19/a> | Johannes Ullrich | Yet Another WHMCS SQL Injection Exploit |
2013-07-16/a> | Johannes Ullrich | Why don't we see more examples of web app attacks via POST? |
2013-02-17/a> | Guy Bruneau | HP ArcSight Connector Appliance and Logger Vulnerabilities |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2013-01-09/a> | Rob VandenBrink | SQL Injection Flaw in Ruby on Rails |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-07-31/a> | Daniel Wesemann | SQL injection, lilupophilupop-style |
2011-12-01/a> | Mark Hofman | SQL Injection Attack happening ATM |
2011-06-06/a> | Johannes Ullrich | The Havij SQL Injection Tool |
2011-04-19/a> | Bojan Zdrnja | SQL injection: why can’t we learn? |
2011-04-01/a> | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2010-12-02/a> | Kevin Johnson | SQL Injection: Wordpress 3.0.2 released |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Obfuscated SQL Injection attacks |
2010-06-09/a> | Deborah Hale | Mass Infection of IIS/ASP Sites |
2010-02-06/a> | Guy Bruneau | LANDesk Management Gateway Vulnerability |
2009-07-16/a> | Bojan Zdrnja | OWC exploits used in SQL injection attacks |
2009-05-19/a> | Bojan Zdrnja | Advanced blind SQL injection (with Oracle examples) |
2009-05-09/a> | Patrick Nolan | Shared SQL Injection Lessons Learned blog item |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-02-11/a> | Robert Danford | ProFTPd SQL Authentication Vulnerability exploit activity |
2008-12-12/a> | Johannes Ullrich | MSIE 0-day Spreading Via SQL Injection |
2008-12-01/a> | Jason Lam | Input filtering and escaping in SQL injection mitigation |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
2008-09-29/a> | Daniel Wesemann | ASPROX mutant |
2008-09-01/a> | John Bambenek | The Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months |
2008-08-23/a> | Mark Hofman | SQL injections - an update |
2008-08-08/a> | Mark Hofman | More SQL Injections - very active right now |
2008-07-24/a> | Bojan Zdrnja | What's brewing in Danmec's pot? |
2008-06-30/a> | Marcus Sachs | More SQL Injection with Fast Flux hosting |
2008-06-24/a> | Jason Lam | SQL Injection mitigation in ASP |
2008-06-24/a> | Jason Lam | Microsoft SQL Injection Prevention Strategy |
2008-06-23/a> | donald smith | Preventing SQL injection |
2008-06-13/a> | Johannes Ullrich | SQL Injection: More of the same |
2008-05-20/a> | Raul Siles | List of malicious domains inserted through SQL injection |
2008-04-24/a> | donald smith | Hundreds of thousands of SQL injections |
2008-04-16/a> | Bojan Zdrnja | The 10.000 web sites infection mystery solved |
2008-03-14/a> | Kevin Liston | 2117966.net-- mass iframe injection |
2008-01-09/a> | Bojan Zdrnja | Mass exploits with SQL Injection |
2007-02-24/a> | Jason Lam | Prepared Statements and SQL injections |
JAVASCRIPT |
2020-11-13/a> | Xavier Mertens | Old Worm But New Obfuscation Technique |
2020-07-24/a> | Xavier Mertens | Compromized Desktop Applications by Web Technologies |
2020-06-11/a> | Xavier Mertens | Anti-Debugging JavaScript Techniques |
2020-03-27/a> | Xavier Mertens | Malicious JavaScript Dropping Payload in the Registry |
2019-08-09/a> | Xavier Mertens | 100% JavaScript Phishing Page |
2019-06-10/a> | Xavier Mertens | Interesting JavaScript Obfuscation Example |
2019-02-07/a> | Xavier Mertens | Phishing Kit with JavaScript Keylogger |
2018-07-13/a> | Xavier Mertens | Cryptominer Delivered Though Compromized JavaScript File |
2018-06-18/a> | Xavier Mertens | Malicious JavaScript Targeting Mobile Browsers |
2017-06-22/a> | Xavier Mertens | Obfuscating without XOR |
2017-03-24/a> | Xavier Mertens | Nicely Obfuscated JavaScript Sample |
2017-03-04/a> | Xavier Mertens | How your pictures may affect your website reputation |
2017-02-12/a> | Xavier Mertens | Analysis of a Suspicious Piece of JavaScript |
2016-08-28/a> | Guy Bruneau | Spam with Obfuscated Javascript |
2016-06-18/a> | Rob VandenBrink | Controlling JavaScript Malware Before it Runs |
2016-02-20/a> | Didier Stevens | Locky: JavaScript Deobfuscation |
2016-02-07/a> | Xavier Mertens | More Malicious JavaScript Obfuscation |
2016-01-15/a> | Xavier Mertens | JavaScript Deobfuscation Tool |
2015-08-07/a> | Tony Carothers | Critical Firefox Update Today |
2014-08-29/a> | Johannes Ullrich | False Positive or Not? Difficult to Analyze Javascript |
2014-07-02/a> | Johannes Ullrich | Simple Javascript Extortion Scheme Advertised via Bing |
2013-08-07/a> | Johannes Ullrich | Firefox 23 and Mixed Active Content |
2013-04-23/a> | Russ McRee | Microsoft's Security Intelligence Report (SIRv14) released |
2013-02-08/a> | Kevin Shortt | Is it Spam or Is it Malware? |
2012-06-25/a> | Guy Bruneau | Using JSDetox to Analyze and Deobfuscate Javascript |
2012-05-22/a> | Johannes Ullrich | nmap 6 released |
2012-04-25/a> | Daniel Wesemann | Blacole's obfuscated JavaScript |
2012-01-22/a> | Johannes Ullrich | Javascript DDoS Tool Analysis |
2012-01-03/a> | Bojan Zdrnja | The tale of obfuscated JavaScript continues |
2011-12-07/a> | Lenny Zeltser | V8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation |
2011-06-06/a> | Manuel Humberto Santander Pelaez | Phishing: Same goal, same techniques and people still falling for such scams |
2011-04-23/a> | Manuel Humberto Santander Pelaez | Image search can lead to malware download |
2010-12-02/a> | Kevin Johnson | Robert Hansen and our happiness |
2010-07-04/a> | Manuel Humberto Santander Pelaez | Malware inside PDF Files |
2010-03-05/a> | Kyle Haugsness | Javascript obfuscators used in the wild |
2009-05-04/a> | Tom Liston | Adobe Reader/Acrobat Critical Vulnerability |
2009-04-07/a> | Bojan Zdrnja | Advanced JavaScript obfuscation (or why signature scanning is a failure) |
2009-04-02/a> | Bojan Zdrnja | JavaScript insertion and log deletion attack tools |
2009-02-25/a> | Andre Ludwig | Adobe Acrobat pdf 0-day exploit, No JavaScript needed! |
2008-07-14/a> | Daniel Wesemann | Obfuscated JavaScript Redux |
2008-06-30/a> | Marcus Sachs | More SQL Injection with Fast Flux hosting |
2008-05-20/a> | Raul Siles | List of malicious domains inserted through SQL injection |
2008-04-06/a> | Daniel Wesemann | Advanced obfuscated JavaScript analysis |
2008-04-03/a> | Bojan Zdrnja | Mixed (VBScript and JavaScript) obfuscation |
BLACKLIST |
2009-05-27/a> | donald smith | Host file black lists |
2008-05-20/a> | Raul Siles | List of malicious domains inserted through SQL injection |