Vulnerability Disclosure 18/May/2023 CVE-2023-27233: SQL Command Execution Vulnerability in Piwigo 13.5.0 Survey reveals weakness in the open source software, allowing the execution of arbitrary SQL commands
Vulnerability Disclosure 17/May/2023 CVE-2023-26876: SQL injection vulnerability found in Piwigo image management software Security flaw may allow unauthorized access and retrieval of sensitive server data
Intelligence 03/March/2021 Jupyter Notebooks for fun and cryptomining Criminals are taking advantage of weaknesses in the data science tool to mine cryptocurrencies
Web Application Security 24/February/2021 SQL Injection: There was a comma halfway How to efficiently exploit a Blind SQL Injection when the vulnerable application removes the character โ,โ (comma) from the request?
Web Application Security 19/November/2020 A long time ago, in a web far away, the SQL Injection appeared Understand how the SQL Injection works and how to protect yourself against it
Vulnerability Disclosure 18/May/2023 CVE-2023-27233: SQL Command Execution Vulnerability in Piwigo 13.5.0 Survey reveals weakness in the open source software, allowing the execution of arbitrary SQL commands
Vulnerability Disclosure 17/May/2023 CVE-2023-26876: SQL injection vulnerability found in Piwigo image management software Security flaw may allow unauthorized access and retrieval of sensitive server data
Intelligence 03/March/2021 Jupyter Notebooks for fun and cryptomining Criminals are taking advantage of weaknesses in the data science tool to mine cryptocurrencies
Web Application Security 24/February/2021 SQL Injection: There was a comma halfway How to efficiently exploit a Blind SQL Injection when the vulnerable application removes the character โ,โ (comma) from the request?
Web Application Security 19/November/2020 A long time ago, in a web far away, the SQL Injection appeared Understand how the SQL Injection works and how to protect yourself against it