Web Vulnerabilities Exploitation
SQL Injection
SQL Injection
Spett
SQL Injection - Are Your Web Applications Vulnerable?
?
Uncommon SQL Injection
N3T D3VIL
and more SQL injection
Di Paola
(more) advanced SQL injection
Anley
Blind SQL Injection
Spett
Blindfolded SQL Injection
Maor
Second-order Code Inkection Attacks
Ollmann
An Introduction to SQL Injection Attacks for Oracle Developers
Kost
Advanced SQL Injection In Oracle Databases
Martínez
Manipulating Microsoft SQL Server Using SQL Injection
Cerrudo
Advanced SQL Injection In SQL Server Applications
Anley
Lateral SQL Injection - A new Class of Vulnerability in Oracle
David Litchfield
 
Cross-site scripting (XSS)
Cross-Site Scripting for Fun and Profit
Nexus
XSS The Complete Walkthrough
t0pP8uZz
XSS Attacks FAQ
Mangarae
Advanced Cross-Site-Scripting with Real-time Remote Attacker Control
Rager
Cross Site Scripting filtration Bypass
Muhammad
xss2phishing
?
 
PHP related vulnerabilities
PHP Underground Security
Omnipresent
Php Endangers - Remote Code Execution
Muhammad
Dynamic Evaluation Vulnerabilities in PHP applications
?
Remote and Local File Inclusion Exploits
sunjester
Web Application Auditing and Exploitation
ReZEN
Secure file upload in PHP web applications
Bezroutchko
 
Misc
Weaknesses in Web-Applications v1.7
theblacksheep
Web Bug v1.0
theblacksheep
The Website Attack Guide
?
Cookie Stealing Upgrade - Ajax Style
AJP
Cross Site Request Forgery - the Sea Surf
Nexus
Biocode uploading using only HTTP
TheVoid
Abusing the internet with popular search engine technologies
c0ntex
Bypassing Oracle dbms_assert
Kornbrust
Buffer Truncation Abuse in Microsoft SQL Server Based Applications
Steele
Preventing CSRF
Nexus
Access Through Access
Brett Moore
Bypassing Web Authentication and Authorization with HTTP Verb Tampering
Arsan Dabirsiaghi
File Download Injection
Jeff Williams
The Extended HTML Form attack revisited
Sandro Gauci
DoS Attacks Using SQL Wildcards
Ferruh Mavituna