Tagged articles
121 articles
Page 1 of 2
Black & White Path
Black & White Path
Apr 27, 2026 · Information Security

How I Exploited Multiple Vulnerabilities in a University System

This article details a step‑by‑step penetration test on a university’s web platform, covering XSS file uploads, JWT tampering for arbitrary login, massive personal data leakage, SQL injection payloads, and the exposure of several AK/SK secrets, all with concrete screenshots and commands.

JWTSQL injectionXSS
0 likes · 5 min read
How I Exploited Multiple Vulnerabilities in a University System
Black & White Path
Black & White Path
Apr 25, 2026 · Information Security

How I Bypassed a WAF with SQL Injection: A Step‑by‑Step Walkthrough

The article details a hands‑on investigation of a web application firewall that strips SQL keywords, shows how order‑by and CASE‑WHEN payloads can be used to probe column limits, construct blind injection strings, and ultimately achieve data extraction despite multiple filtering layers.

CASE WHEN payloadSQL injectionWAF Bypass
0 likes · 7 min read
How I Bypassed a WAF with SQL Injection: A Step‑by‑Step Walkthrough
Black & White Path
Black & White Path
Apr 18, 2026 · Information Security

How to Locate FortiClient EMS Servers with Google and Shodan

The article explains the FortiGhost (CVE‑2026‑21643) pre‑authentication SQL injection RCE vulnerability in FortiClient EMS and provides specific Google and Shodan search queries—title, HTML content, and favicon hash—to discover vulnerable instances.

CVE-2026-21643FortiClient EMSFortiGhost
0 likes · 1 min read
How to Locate FortiClient EMS Servers with Google and Shodan
Black & White Path
Black & White Path
Apr 16, 2026 · Information Security

Bypassing Alibaba Cloud WAF on a Financial Site via MySQL Chain Comparison

During an authorized penetration test of a financial institution’s website protected by Alibaba Cloud WAF, the author discovered a SQL injection point, used MySQL’s chain‑comparison feature to close the injection, identified the database type, and crafted boolean‑based payloads—including POSITION and binary tricks—to extract the current user name character by character.

Alibaba Cloud WAFBoolean blind injectionPOSITION function
0 likes · 7 min read
Bypassing Alibaba Cloud WAF on a Financial Site via MySQL Chain Comparison
Black & White Path
Black & White Path
Mar 16, 2026 · Information Security

How I Discovered and Exploited a 0‑Day in an EIS Office Platform

The article walks through setting up a Windows 2012 IIS environment, reverse‑engineering the product’s 3DES license check, analyzing web.config permissions, and uncovering multiple vulnerabilities—including SSRF, several SQL injections, and arbitrary file‑upload flaws—culminating in a full bypass of the EIS system’s authentication.

0dayEISSQL injection
0 likes · 8 min read
How I Discovered and Exploited a 0‑Day in an EIS Office Platform
IT Services Circle
IT Services Circle
Jan 7, 2026 · Backend Development

What Tencent Backend Engineers Earn and How to Nail Their Interview

This article shares a collected list of 2023 Tencent backend developer compensation packages—showing total first‑year offers starting above 40 W RMB—followed by detailed explanations of interview questions covering Redis caching, MySQL transactions, hot‑key detection, SQL injection, HTTP/HTTPS differences, API timeout troubleshooting, and microservice migration strategies.

Backend SalarySQL injectionTencent
0 likes · 24 min read
What Tencent Backend Engineers Earn and How to Nail Their Interview
php Courses
php Courses
Nov 26, 2025 · Information Security

How to Harden Your PHP Applications Against Common Attacks

This guide outlines essential PHP security best practices—including timely updates, prepared statements, output escaping, safe file uploads, session hardening, server configuration, input validation, framework usage, and additional tools—to help developers protect web applications from prevalent threats.

SQL injectionSession ManagementWeb
0 likes · 8 min read
How to Harden Your PHP Applications Against Common Attacks
JavaGuide
JavaGuide
Nov 20, 2025 · Backend Development

iFlytek Salary Offers Revealed + Comprehensive Java Interview Prep

The article shares iFlytek's recent campus salary packages, then dives into a detailed Java interview guide covering Redis data types, key expiration handling, thread safety, ThreadLocal usage, MySQL covering and composite indexes, slow‑query analysis, and SQL‑injection prevention techniques.

Java interviewSQL injectionThreadLocal
0 likes · 17 min read
iFlytek Salary Offers Revealed + Comprehensive Java Interview Prep
Architecture Digest
Architecture Digest
Nov 19, 2025 · Information Security

Preventing SQL Injection: Use Prepared Statements and MyBatis Safely

SQL injection lets attackers turn simple input fields into destructive commands that can delete or compromise databases; the article explains how string‑concatenated queries become vulnerable, demonstrates the attack step‑by‑step, and shows how parameterized queries via PreparedStatement and MyBatis’ #{ } syntax, plus defense‑in‑depth measures, effectively mitigate the risk.

Database SecurityMyBatisParameterized Query
0 likes · 10 min read
Preventing SQL Injection: Use Prepared Statements and MyBatis Safely
Xiao Liu Lab
Xiao Liu Lab
Oct 29, 2025 · Databases

5 Underrated MySQL Security Settings That Block 90% of Attacks

Even if your database appears functional and backed up, a single SQL injection can expose all data; this article reveals five often‑overlooked MySQL security configurations—disabling remote root login, turning off dangerous functions, enabling audit logs, enforcing SSL, and cleaning ghost accounts—to dramatically harden your database in under 30 minutes.

Database SecuritySQL injectionSSL
0 likes · 6 min read
5 Underrated MySQL Security Settings That Block 90% of Attacks
Code Mala Tang
Code Mala Tang
Oct 26, 2025 · Databases

Why Parameterized Queries Supercharge SQL Performance (And Prevent Injection)

This article explains how using bound (parameterized) queries in SQL Server improves performance by enabling execution plan reuse, reducing compilation overhead and memory usage, while also preventing SQL injection, and discusses potential pitfalls like parameter sniffing and how to mitigate them with OPTION (RECOMPILE).

Parameterized QueriesPerformance OptimizationSQL
0 likes · 6 min read
Why Parameterized Queries Supercharge SQL Performance (And Prevent Injection)
JavaGuide
JavaGuide
Oct 25, 2025 · Interview Experience

Microstrategy: A 9‑5‑Friendly Foreign Tech Company with Strong Java Interview Process

The article introduces Microstrategy, a US‑based BI firm with a large Hangzhou R&D center, outlines its generous 9‑5‑style work environment, details the interview stages—including written test, technical and non‑technical rounds—and provides concrete advice on self‑introduction, project presentation, system design, Canal‑MySQL sync, XXL‑Job video transcoding, Redis, MongoDB, SQL injection, Java exceptions, OOP concepts, and interview puzzles.

Backend DevelopmentCanalJava interview
0 likes · 18 min read
Microstrategy: A 9‑5‑Friendly Foreign Tech Company with Strong Java Interview Process
MaGe Linux Operations
MaGe Linux Operations
Sep 13, 2025 · Information Security

How to Build an Enterprise‑Grade WAF with OpenResty from Scratch

This guide walks through constructing a high‑performance, cost‑effective enterprise‑level Web Application Firewall using OpenResty, covering why OpenResty is ideal, core architecture, modules for request lifecycle management, IP control, rate limiting, SQL injection and XSS detection, intelligent CC protection, monitoring, performance tuning, deployment tips, real‑world case study, and future enhancements.

LuaNGINXOpenResty
0 likes · 24 min read
How to Build an Enterprise‑Grade WAF with OpenResty from Scratch
Java Architect Essentials
Java Architect Essentials
Jul 19, 2025 · Information Security

Why Spring Security’s Full‑Chain Protection Can Eradicate XSS and SQL Injection

This article explains how a comprehensive, full‑stack security approach using Spring Security—covering request sanitization, parameterized queries, and built‑in authentication, authorization, CSRF and session safeguards—can dramatically reduce XSS and SQL injection vulnerabilities to near zero.

Full-Stack ProtectionJavaSQL injection
0 likes · 13 min read
Why Spring Security’s Full‑Chain Protection Can Eradicate XSS and SQL Injection
Python Programming Learning Circle
Python Programming Learning Circle
Jun 19, 2025 · Databases

Master Python Database Access: From DB‑API Basics to Connection Pooling with PyMySQL

This guide walks you through Python's DB‑API, lists supported databases, shows how to install and use PyMySQL for basic CRUD operations, demonstrates retrieving auto‑increment IDs, prevents SQL injection, and explains thread‑safe connection pooling with DBUtils, including code examples for both locked and lock‑free scenarios.

Connection PoolDB-APISQL injection
0 likes · 15 min read
Master Python Database Access: From DB‑API Basics to Connection Pooling with PyMySQL
Wukong Talks Architecture
Wukong Talks Architecture
May 14, 2025 · Information Security

AI-Powered CodeBuddy Uncovers and Fixes Real SQL Injection and XSS Bugs

This article walks through two real-world security flaws—a high‑risk SQL injection and a medium‑risk stored XSS—showing how the CodeBuddy AI assistant can automatically detect, analyze, and remediate them with prepared statements and CSP enhancements, while explaining the underlying concepts and best practices.

AI code reviewCodeBuddyContent Security Policy
0 likes · 13 min read
AI-Powered CodeBuddy Uncovers and Fixes Real SQL Injection and XSS Bugs
Java Tech Enthusiast
Java Tech Enthusiast
Apr 27, 2025 · Frontend Development

Common Front-End Security Attacks, Principles, and Mitigations

The article outlines prevalent front‑end security threats such as XSS, SQL injection, CSRF, MITM, clickjacking, misconfiguration, and vulnerable dependencies, explains their underlying principles, and recommends practical mitigations including input validation, CSP, HTTPS/TLS, CSRF tokens, secure headers, regular audits, and dependency scanning.

CSRFMITMSQL injection
0 likes · 8 min read
Common Front-End Security Attacks, Principles, and Mitigations
php Courses
php Courses
Mar 10, 2025 · Information Security

Security Protection Strategies and Vulnerability Mitigation for PHP Applications

This article examines essential security measures for PHP applications, covering protection against SQL injection, XSS, CSRF, unsafe file uploads, session fixation, weak passwords, error disclosure, and the importance of HTTPS, with practical code examples and configuration tips to build more resilient web services.

SQL injectionXSSfile-upload
0 likes · 8 min read
Security Protection Strategies and Vulnerability Mitigation for PHP Applications
Pan Zhi's Tech Notes
Pan Zhi's Tech Notes
Feb 10, 2025 · Information Security

Is Your Site Vulnerable? Understanding the Common SQL Injection Attack

This article explains the fundamentals of SQL injection attacks, demonstrates step‑by‑step exploitation using the DVWA platform—including data extraction, login bypass, and injection point detection—and outlines practical prevention techniques such as input validation, regex filtering, and prepared statements.

DVWASQL injectionWeb Security
0 likes · 11 min read
Is Your Site Vulnerable? Understanding the Common SQL Injection Attack
php Courses
php Courses
Jan 27, 2025 · Information Security

How to Prevent SQL Injection in PHP Applications

This article explains essential techniques to protect PHP applications from SQL injection attacks, covering prepared statements, input validation, ORM usage, escaping, stored procedures, permission restrictions, web application firewalls, and logging, with practical code examples for PDO, MySQLi, and Eloquent.

ORMPHPPrepared Statements
0 likes · 5 min read
How to Prevent SQL Injection in PHP Applications
FunTester
FunTester
Jul 16, 2024 · Backend Development

Mastering JDBC: Best Practices for Secure and Efficient Java Database Access

This guide explains how to set up JDBC drivers, construct connection URLs, use PreparedStatement instead of Statement, iterate ResultSet safely, manage resources with try‑with‑resources, handle transactions, employ connection pools, and properly process SQLExceptions for robust Java database applications.

Connection PoolJDBCJava
0 likes · 15 min read
Mastering JDBC: Best Practices for Secure and Efficient Java Database Access
php Courses
php Courses
Apr 10, 2024 · Information Security

Preventing SQL Injection in PHP Using mysqli_real_escape_string

This article explains how SQL injection attacks can compromise web applications and demonstrates how to securely handle user input in PHP by using the mysqli_real_escape_string function to escape special characters before constructing SQL queries, thereby protecting the database from malicious exploitation.

Database SecurityPHPSQL injection
0 likes · 4 min read
Preventing SQL Injection in PHP Using mysqli_real_escape_string
dbaplus Community
dbaplus Community
Mar 13, 2024 · Databases

Why Developers Use “WHERE 1=1” in SQL Queries

The article explains the practical reasons for adding the always‑true condition “WHERE 1=1” in SQL, covering its role in preventing syntax errors, facilitating dynamic query building, copying tables, and its historical performance impact on MySQL.

Dynamic QuerySQLSQL injection
0 likes · 6 min read
Why Developers Use “WHERE 1=1” in SQL Queries
php Courses
php Courses
Jan 29, 2024 · Information Security

Guide to Preventing LDAP and SQL Injection Attacks in PHP

This article explains the principles, provides code examples, and outlines preventive measures for LDAP and SQL injection attacks in PHP, helping developers understand how these vulnerabilities work and how to secure their web applications through input validation, parameter binding, and access control.

LDAP injectionSQL injectionWeb Security
0 likes · 6 min read
Guide to Preventing LDAP and SQL Injection Attacks in PHP
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jan 8, 2024 · Information Security

Understanding SQL Injection and Prevention with Spring Boot and MyBatis

This article explains the concept of SQL injection, demonstrates a vulnerable query example, and provides a step‑by‑step Spring Boot and MyBatis implementation—including table creation, Java controller, service, DAO, mapper, and configuration—to illustrate how proper parameter handling prevents injection attacks.

Database SecurityJavaMyBatis
0 likes · 10 min read
Understanding SQL Injection and Prevention with Spring Boot and MyBatis
JD Cloud Developers
JD Cloud Developers
Nov 30, 2023 · Backend Development

How to Extend MyBatis-Plus with Custom CRUD Methods and SQL Injection

Learn how to leverage MyBatis-Plus's built-in CRUD capabilities, create custom SQL methods like SelectByErp, integrate them via a custom SqlInjector, and modify existing operations such as AlwaysUpdateSomeColumnById and UpdateById for sharding scenarios, enabling reusable and efficient data access across your backend.

CRUDJavaORM
0 likes · 9 min read
How to Extend MyBatis-Plus with Custom CRUD Methods and SQL Injection
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFHashingPython
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures
MaGe Linux Operations
MaGe Linux Operations
Sep 23, 2023 · Information Security

How to Prevent SQL Injection in Java Projects: From PreparedStatement to Nginx Filters

This article explains what SQL injection is, demonstrates a vulnerable example, and presents four practical defenses for Java applications—including PreparedStatement, MyBatis #{} placeholders, request‑parameter filtering, and Nginx reverse‑proxy rules—complete with code snippets and configuration details.

JavaMyBatisPreparedStatement
0 likes · 8 min read
How to Prevent SQL Injection in Java Projects: From PreparedStatement to Nginx Filters
php Courses
php Courses
Sep 19, 2023 · Backend Development

Understanding PHP's addslashes() Function: Syntax, Usage, and Security Considerations

The article explains PHP's addslashes() function, detailing its syntax, how it escapes specific characters, provides code examples, demonstrates its role in preventing SQL injection, and advises using stronger escaping methods such as mysqli_real_escape_string or PDO prepared statements.

Backend DevelopmentSQL injectionSecurity
0 likes · 6 min read
Understanding PHP's addslashes() Function: Syntax, Usage, and Security Considerations
Laravel Tech Community
Laravel Tech Community
Sep 5, 2023 · Backend Development

Using MySQLi and PDO to Prevent SQL Injection in PHP

The article explains why directly concatenating user input into SQL queries leads to injection vulnerabilities and demonstrates how to secure PHP database operations using input validation, escaping functions, and prepared statements with MySQLi and PDO, while comparing related sanitization functions.

MySQLiPDOPHP
0 likes · 5 min read
Using MySQLi and PDO to Prevent SQL Injection in PHP
Selected Java Interview Questions
Selected Java Interview Questions
Aug 23, 2023 · Information Security

Understanding SQL Injection and Prevention Techniques in Java Projects

SQL injection is a critical web security flaw where unsanitized user input can alter database queries, and this article explains its mechanics, demonstrates vulnerable Java code, and outlines four prevention methods—PreparedStatement, MyBatis #{}, request parameter filtering, and Nginx reverse‑proxy rules—complete with code examples.

JavaMyBatisNGINX
0 likes · 9 min read
Understanding SQL Injection and Prevention Techniques in Java Projects
php Courses
php Courses
Jul 5, 2023 · Information Security

Using PHP Security Library Functions to Prevent Code Injection Attacks

This article introduces PHP security library functions such as htmlspecialchars(), htmlentities(), and mysqli_real_escape_string(), demonstrating with code examples how they filter and validate user input to prevent XSS and SQL injection attacks, while noting that additional security measures are still required.

PHPSQL injectionSecurity
0 likes · 4 min read
Using PHP Security Library Functions to Prevent Code Injection Attacks
php Courses
php Courses
Jun 11, 2023 · Information Security

Protecting Nginx with a ModSecurity Web Application Firewall (WAF)

This article explains why web applications need a Web Application Firewall, introduces ModSecurity as a WAF for Nginx, and provides step‑by‑step installation, configuration, custom rule creation, and service restart commands to defend against attacks such as SQL injection and XSS.

ModSecuritySQL injectionWAF
0 likes · 4 min read
Protecting Nginx with a ModSecurity Web Application Firewall (WAF)
Programmer DD
Programmer DD
Mar 15, 2023 · Information Security

How to Prevent XSS and SQL Injection in SpringBoot: Filters and Code Examples

This article explains XSS attack types, SQL injection risks, and provides practical SpringBoot filter implementations with MyBatis prepared statements and custom deserializers to sanitize request parameters, JSON bodies, and prevent malicious script and database attacks.

MyBatisRequest SanitizationSQL injection
0 likes · 13 min read
How to Prevent XSS and SQL Injection in SpringBoot: Filters and Code Examples
php Courses
php Courses
Jan 29, 2023 · Information Security

SQL Injection Techniques, Exploits, and sqlmap Usage Guide

This article explains how forged HTTP headers can lead to SQL injection, demonstrates PHP functions for obtaining client IPs, shows blind injection payloads for enumerating databases, tables, columns, and users, and provides practical sqlmap commands and code examples for exploiting and testing vulnerabilities.

Database ExploitationSQL injectionSQLMap
0 likes · 15 min read
SQL Injection Techniques, Exploits, and sqlmap Usage Guide
Laravel Tech Community
Laravel Tech Community
Jan 3, 2023 · Information Security

MySQL Injection Techniques: Detecting Vulnerabilities, Determining Field Count, Using UNION SELECT, and Exploiting load_file()

This article explains how to identify MySQL injection points, determine the number of columns with ORDER BY, enumerate fields via UNION SELECT, leverage common MySQL functions, and exploit the load_file() function—including char() encoding, replace, substring, and INTO OUTFILE—to read or write files on the target system.

SQL injectionUNION SELECTload_file
0 likes · 11 min read
MySQL Injection Techniques: Detecting Vulnerabilities, Determining Field Count, Using UNION SELECT, and Exploiting load_file()
Laravel Tech Community
Laravel Tech Community
Dec 29, 2022 · Information Security

Security Vulnerability Analysis of XiongHai CMS 1.0

The article provides a detailed security analysis of the XiongHai CMS 1.0, describing its directory structure and exposing multiple vulnerabilities including file inclusion, SQL injection, XSS, and vertical privilege escalation, along with example exploit code.

CMSSQL injectionVulnerability
0 likes · 8 min read
Security Vulnerability Analysis of XiongHai CMS 1.0
Laravel Tech Community
Laravel Tech Community
Nov 24, 2022 · Information Security

Comprehensive phpMyAdmin Vulnerability Exploitation Guide

This article provides an extensive overview of phpMyAdmin security weaknesses, detailing information‑gathering techniques, version detection, path discovery, multiple exploitation methods such as file writes, log manipulation, slow‑query abuse, user‑defined functions, MOF attacks, and step‑by‑step PoCs for numerous CVEs, all illustrated with concrete SQL and script examples.

CVEExploitationSQL injection
0 likes · 19 min read
Comprehensive phpMyAdmin Vulnerability Exploitation Guide
HomeTech
HomeTech
Aug 4, 2022 · Information Security

Preventing SQL Injection: Principles, Practices, and Safe MyBatis Usage

This article explains the fundamentals of SQL injection attacks, outlines their severe consequences, and provides a comprehensive set of prevention principles and practical measures—including parameterized queries, strong typing, input validation, and secure MyBatis configurations—to help developers safeguard backend applications and databases.

MyBatisPreparedStatementSQL injection
0 likes · 10 min read
Preventing SQL Injection: Principles, Practices, and Safe MyBatis Usage
Code Ape Tech Column
Code Ape Tech Column
May 7, 2022 · Information Security

SQL Injection Attack Demonstration and Prevention in a Java Spring Application

This article explains how SQL injection can exploit a Java Spring course‑selection system by concatenating user input into SQL statements, demonstrates various injection techniques such as always‑true conditions and UNION queries, and provides multiple defensive measures including prepared statements, type checking, permission restrictions, and request‑parameter filtering.

JavaSQL injectionSecurity
0 likes · 5 min read
SQL Injection Attack Demonstration and Prevention in a Java Spring Application
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Overview of Common Information Security Techniques: Network, System, and Cryptography

This article provides a comprehensive overview of essential information security technologies, covering network attacks such as SQL injection, XSS, CSRF, DDoS, DNS and TCP hijacking, system vulnerabilities like stack overflow and privilege escalation, and core cryptographic concepts including symmetric/asymmetric encryption, key exchange, hashing, encoding, and multi‑factor authentication.

DDoSDNS hijackingSQL injection
0 likes · 23 min read
Overview of Common Information Security Techniques: Network, System, and Cryptography
Top Architect
Top Architect
Jan 19, 2022 · Information Security

Penetration Testing Walkthrough: Bypassing Invitation Code and Accessing the Backend of a Mobile App

This article details a step‑by‑step penetration testing process where the author captures network traffic from a mobile app, enumerates hidden API endpoints, exploits injection flaws to retrieve backend credentials, examines upload validation, and ultimately gains admin access while highlighting the challenges faced.

API enumerationSQL injectionmobile app security
0 likes · 7 min read
Penetration Testing Walkthrough: Bypassing Invitation Code and Accessing the Backend of a Mobile App
Top Architect
Top Architect
Jan 8, 2022 · Backend Development

Understanding the Differences Between ${} and #{} in MyBatis and Their Impact on SQL Injection

This article explains how MyBatis' ${} and #{} placeholders differ in syntax substitution and security, demonstrates their usage with DAO interfaces, Mapper XML, and JUnit tests, analyzes SQL injection risks, shows the underlying PreparedStatement handling, and provides practical guidelines for when to use each placeholder.

JavaMyBatisORM
0 likes · 11 min read
Understanding the Differences Between ${} and #{} in MyBatis and Their Impact on SQL Injection
TAL Education Technology
TAL Education Technology
Jan 6, 2022 · Information Security

Web Security Essentials for Front-End Engineers

This article educates front‑end engineers about common web security threats such as XSS, CSRF, directory exposure, SQL injection, command injection, DDoS, and hijacking, and provides practical mitigation techniques and best‑practice principles to build more secure web applications.

CSRFSQL injectionWeb Security
0 likes · 12 min read
Web Security Essentials for Front-End Engineers
政采云技术
政采云技术
Dec 30, 2021 · Information Security

Introduction to Web Security Testing and Common Vulnerabilities

This article introduces web security testing, explains why it is essential, describes common vulnerabilities such as weak passwords, XSS, CSRF, SQL injection, authorization bypass, and file upload issues, and offers practical prevention measures and testing guidelines for developers and testers.

SQL injectionVulnerabilityWeb Security
0 likes · 14 min read
Introduction to Web Security Testing and Common Vulnerabilities
Laravel Tech Community
Laravel Tech Community
Sep 11, 2021 · Information Security

Understanding SQL Injection Vulnerabilities in PHP and How to Prevent Them

This article explains the causes, impacts, and various techniques of SQL injection attacks in PHP applications, demonstrates vulnerable code examples, and provides practical mitigation measures such as input validation, error handling, character encoding considerations, and secure coding practices.

PHPSQL injectionVulnerability
0 likes · 10 min read
Understanding SQL Injection Vulnerabilities in PHP and How to Prevent Them
Alibaba Cloud Developer
Alibaba Cloud Developer
Sep 7, 2021 · Information Security

How to Prevent SQL Injection in MyBatis and Other ORM Frameworks

This article explains the principles behind SQL injection, common pitfalls in MyBatis and other ORM tools, and provides concrete safe coding patterns, configuration tips, and code examples to help developers eliminate injection vulnerabilities in their persistence layer.

JavaMyBatisORM security
0 likes · 15 min read
How to Prevent SQL Injection in MyBatis and Other ORM Frameworks
php Courses
php Courses
Aug 25, 2021 · Backend Development

Laravel Batch Update Multiple Records with SQL Injection Prevention

This article demonstrates how to implement a safe batch‑update method for Laravel's Eloquent models that prevents SQL injection, provides the full PHP implementation, usage example, and the resulting SQL statement, highlighting the performance benefits over individual updates.

Batch UpdateEloquentLaravel
0 likes · 4 min read
Laravel Batch Update Multiple Records with SQL Injection Prevention
Code Ape Tech Column
Code Ape Tech Column
Jul 12, 2021 · Information Security

MyBatis SQL Injection Auditing: Common Vulnerabilities and Practical Analysis

This article explains how SQL injection can still occur in Java applications using MyBatis, describes the three typical vulnerable patterns (LIKE, IN, ORDER BY), and provides a step‑by‑step practical workflow—including code snippets and verification—to help beginners audit and remediate such issues.

Code AuditingJavaMyBatis
0 likes · 7 min read
MyBatis SQL Injection Auditing: Common Vulnerabilities and Practical Analysis
vivo Internet Technology
vivo Internet Technology
May 19, 2021 · Backend Development

MyBatis-Plus SQL Auto-Injection Principle Analysis

MyBatis‑Plus enhances MyBatis by automatically injecting CRUD SQL via BaseMapper, using entity annotations and template methods to map classes to tables, eliminating repetitive manual SQL, supporting lambda queries, pagination, and performance tools, all with minimal intrusion and overhead.

BaseMapperJavaMyBatis
0 likes · 10 min read
MyBatis-Plus SQL Auto-Injection Principle Analysis
21CTO
21CTO
Apr 15, 2021 · Information Security

Essential Secure Coding Practices Every Developer Should Follow

This article presents practical secure coding guidelines—including input escaping, avoiding auto‑increment IDs, minimalist HTTP methods, least‑privilege design, mandatory HTTPS, strong encryption algorithms, and whitelist‑based execution—to help developers embed real‑time security into modern software.

HTTPSSQL injectionSecure Coding
0 likes · 7 min read
Essential Secure Coding Practices Every Developer Should Follow
Open Source Linux
Open Source Linux
Apr 14, 2021 · Information Security

Step‑by‑Step Web Penetration Test: From Recon to Root Access

This tutorial walks you through a complete web penetration test on the fictional site hack‑test.com, covering DNS enumeration, server fingerprinting, vulnerability scanning with Nikto and w3af, exploiting SQL injection via sqlmap, uploading a PHP webshell, gaining a reverse shell, and finally escalating to root privileges on a Linux server.

Information GatheringSQL injectionWeb Security
0 likes · 10 min read
Step‑by‑Step Web Penetration Test: From Recon to Root Access
Python Crawling & Data Mining
Python Crawling & Data Mining
Mar 25, 2021 · Information Security

Mastering SQL Injection with Sqlmap: A Hands‑On Exploitation Guide

This article introduces the fundamentals of SQL injection, explains Sqlmap's five injection techniques, lists supported databases, shows installation methods, walks through essential commands and options, and provides practical examples for testing and exploiting vulnerable web applications.

Database ExploitationSQL injectionSQLMap
0 likes · 17 min read
Mastering SQL Injection with Sqlmap: A Hands‑On Exploitation Guide
21CTO
21CTO
Mar 15, 2021 · Information Security

How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Breach

A former Facebook engineer serving as Gab's CTO introduced a simple SQL injection flaw, which hackers exploited to steal data from 15,000 users, prompting a $500,000 ransom demand, code deletion, and a heated debate over CTO responsibilities and security best practices.

CTOGitSQL injection
0 likes · 8 min read
How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Breach
ITPUB
ITPUB
Mar 12, 2021 · Information Security

How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Data Breach

A former Facebook engineer, newly hired as CTO of the social platform Gab, introduced a simple SQL injection vulnerability by removing critical reject and filter calls, allowing hackers to steal 70 GB of user data, demand a $500,000 Bitcoin ransom, and expose the company's lax security practices.

CTOGabGit commit
0 likes · 8 min read
How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Data Breach
21CTO
21CTO
Mar 10, 2021 · Information Security

When a Name Like “true” Locks Your iCloud: Lessons in Input Validation

An Apple iCloud account was denied and the user’s ID locked for six months because her surname “true” was mistakenly treated as a Boolean value, highlighting how unescaped input can trigger security mechanisms and the importance of proper string handling in software systems.

SQL injectionbooleaniCloud
0 likes · 5 min read
When a Name Like “true” Locks Your iCloud: Lessons in Input Validation
21CTO
21CTO
Mar 6, 2021 · Information Security

How a Rookie SQL Injection Mistake Cost Gab’s CTO and Users 70 GB of Data

A recent DDoSecrets leak revealed that Gab’s new CTO introduced a simple SQL injection flaw in the Rails codebase, allowing hackers to steal 70 GB of user data, prompting the CEO’s public apology, code deletions, and a stark reminder of the importance of secure coding practices.

CTO mistakeCode reviewRails
0 likes · 9 min read
How a Rookie SQL Injection Mistake Cost Gab’s CTO and Users 70 GB of Data
Laravel Tech Community
Laravel Tech Community
Feb 25, 2021 · Databases

Python Database Operations: Using DB-API, PyMySQL, and Connection Pools

This article introduces Python's DB-API for interacting with various databases, explains how to use PyMySQL and MySQLdb for MySQL operations, demonstrates basic CRUD examples, shows techniques to prevent SQL injection, and presents connection pooling solutions with DBUtils for multi‑threaded applications.

Connection PoolDB-APISQL injection
0 likes · 14 min read
Python Database Operations: Using DB-API, PyMySQL, and Connection Pools
Laiye Technology Team
Laiye Technology Team
Nov 17, 2020 · Information Security

Comprehensive Security Practices and Vulnerability Mitigation at Laiye Technology

This article details Laiye Technology's end‑to‑end security strategy—including application hardening, password policies, brute‑force defenses, SQL injection, XSS and CSRF mitigations, privilege controls, secure file uploads, code‑review standards, and infrastructure vulnerability scanning—to protect sensitive data and AI‑driven robot platforms from a wide range of attacks.

CSRFPassword policySQL injection
0 likes · 21 min read
Comprehensive Security Practices and Vulnerability Mitigation at Laiye Technology
vivo Internet Technology
vivo Internet Technology
Nov 4, 2020 · Backend Development

Node-MyBatis: A JavaScript Full‑Stack Data Persistence Solution for the Wukong Activity Platform

The article describes how the Wukong Activity Platform’s data‑persistence layer uses Node.js as a BFF with MySQL, combines raw drivers, optional ORMs, and a custom lightweight Node‑MyBatis framework that offers dynamic SQL templating, built‑in injection protection, declarative transaction decorators, and automatic TypeScript type generation for full‑stack JavaScript development.

Backend DevelopmentMyBatisNode.js
0 likes · 28 min read
Node-MyBatis: A JavaScript Full‑Stack Data Persistence Solution for the Wukong Activity Platform
php Courses
php Courses
Nov 2, 2020 · Information Security

Common Web Security Vulnerabilities: XSS, SQL Injection, CSRF, CC, DoS and DDoS

This article explains common web security threats—including XSS, SQL injection, CSRF, CC, DoS, and DDoS—detailing their mechanisms, potential impacts, and practical defense strategies such as input validation, token usage, Referer checks, and resource limiting to protect applications and servers.

DoSSQL injectionXSS
0 likes · 14 min read
Common Web Security Vulnerabilities: XSS, SQL Injection, CSRF, CC, DoS and DDoS
Code Ape Tech Column
Code Ape Tech Column
Aug 23, 2020 · Information Security

MyBatis SQL Injection Auditing: Common Pitfalls and Practical Analysis

This article explains how improper use of MyBatis in Java web applications can lead to SQL injection vulnerabilities, illustrates three typical injection scenarios with code examples, and provides a step‑by‑step practical workflow for discovering and confirming such flaws in a real CMS project.

Code AuditingJavaMyBatis
0 likes · 7 min read
MyBatis SQL Injection Auditing: Common Pitfalls and Practical Analysis
Code Ape Tech Column
Code Ape Tech Column
Aug 20, 2020 · Information Security

How to Spot MyBatis SQL Injection Vulnerabilities: A Practical Guide

This article walks through the typical ways MyBatis can introduce SQL injection—through misuse of # and $ in LIKE, IN, and ORDER BY clauses—provides correct code examples, and demonstrates a step‑by‑step reverse‑engineering workflow on an open‑source CMS to locate and confirm the vulnerability.

Code AuditingJavaMyBatis
0 likes · 7 min read
How to Spot MyBatis SQL Injection Vulnerabilities: A Practical Guide
Architecture Digest
Architecture Digest
Aug 16, 2020 · Information Security

MyBatis SQL Injection Auditing: Common Pitfalls and Practical Analysis

This article explains how improper use of MyBatis in Java web applications can lead to SQL injection vulnerabilities, illustrates three typical injection patterns with code examples, and provides a step‑by‑step practical methodology for locating and confirming such flaws in an open‑source CMS project.

Code AuditingJavaMyBatis
0 likes · 6 min read
MyBatis SQL Injection Auditing: Common Pitfalls and Practical Analysis
Top Architect
Top Architect
Aug 12, 2020 · Information Security

Practical Guide to Auditing MyBatis SQL Injection Vulnerabilities

This article explains common MyBatis SQL injection patterns such as fuzzy queries, improper use of the $ placeholder in IN clauses and ORDER BY statements, and provides a step‑by‑step methodology for locating, analyzing, and confirming these vulnerabilities in Java web applications.

JavaMyBatisSQL injection
0 likes · 7 min read
Practical Guide to Auditing MyBatis SQL Injection Vulnerabilities
Architects Research Society
Architects Research Society
Aug 6, 2020 · Information Security

SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies

This article examines the prevalence of SQL injection attacks, presenting Imperva’s recent statistics, common attack vectors, real-world examples, and practical defenses such as prepared statements, input sanitization, and web application firewalls, while also offering Python code illustrations of secure and insecure database queries.

Database SecurityPythonSQL injection
0 likes · 11 min read
SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies
OPPO Amber Lab
OPPO Amber Lab
Jul 22, 2020 · Information Security

Understanding Web Security: Key Vulnerabilities and Penetration Testing Methods

This article explains the fundamentals of web security, outlines typical web architecture, classifies penetration testing approaches, enumerates common vulnerabilities such as SQL injection, XSS, file upload and deserialization, and discusses how attackers combine these flaws to launch advanced exploits.

DeserializationSQL injectionVulnerability Classification
0 likes · 7 min read
Understanding Web Security: Key Vulnerabilities and Penetration Testing Methods
Programmer DD
Programmer DD
Feb 11, 2020 · Backend Development

Preventing SQL Injection in Java: JDBC, MyBatis, JPA & Hibernate Best Practices

This article explains Java persistence technologies—including JDBC, MyBatis, JPA, and Hibernate—highlights common patterns that cause SQL injection, and provides concrete techniques such as parameterized PreparedStatement, MyBatis #{ } binding, dynamic SQL whitelisting, and proper JPA/Hibernate query parameter usage to securely handle user input.

HibernateJDBCJava
0 likes · 10 min read
Preventing SQL Injection in Java: JDBC, MyBatis, JPA & Hibernate Best Practices
ITPUB
ITPUB
Jan 16, 2020 · Information Security

How SQL Injection Works and How to Prevent It with Safe SQLite Code

This article explains what SQL injection is, demonstrates a vulnerable SQLite example that drops a table using malicious input, shows why the attack works, and provides practical prevention techniques such as using parameterized queries, input validation, unpredictable table names, and regular backups to secure databases.

SQL injectionSQLiteinput validation
0 likes · 8 min read
How SQL Injection Works and How to Prevent It with Safe SQLite Code
转转QA
转转QA
Oct 9, 2019 · Information Security

Understanding Security Testing: SQL Injection, XSS, CSRF, and Permission Vulnerabilities

This article explains the differences between functional and security testing, introduces common web vulnerabilities such as SQL injection, cross‑site scripting (XSS), and cross‑site request forgery (CSRF), provides concrete code examples, and offers practical tips for detecting and preventing these issues.

CSRFSQL injectionWeb Vulnerabilities
0 likes · 12 min read
Understanding Security Testing: SQL Injection, XSS, CSRF, and Permission Vulnerabilities
System Architect Go
System Architect Go
Sep 17, 2019 · Information Security

Sequelize ORM SQL Injection Vulnerabilities and Affected Versions

The article outlines several SQL injection vulnerabilities discovered in various Sequelize ORM versions, explains the underlying causes related to improper JSON path key handling for MySQL, MariaDB, Postgres, and SQLite, provides reproduction screenshots, and strongly advises upgrading to patched releases.

Node.jsORMSQL injection
0 likes · 3 min read
Sequelize ORM SQL Injection Vulnerabilities and Affected Versions
Programmer DD
Programmer DD
Jul 16, 2019 · Information Security

How to Prevent XSS and SQL Injection in Spring: A Practical Guide

This article explains the dangers of XSS and SQL injection attacks, demonstrates realistic attack scenarios, and provides a comprehensive backend solution using Spring AOP, HttpMessageConverter, custom Servlet Filters, request wrappers, and ESAPI to sanitize inputs and protect web applications.

ESAPISQL injectionSecurity
0 likes · 17 min read
How to Prevent XSS and SQL Injection in Spring: A Practical Guide
NetEase Game Operations Platform
NetEase Game Operations Platform
Dec 14, 2018 · Information Security

Database Injection Attacks: Principles, Exploits, and Defense Strategies

This article explains why database injection remains a critical security threat, illustrates how attackers exploit vulnerable web applications using manual techniques and automated tools such as sqlmap, and provides comprehensive defensive measures spanning secure coding, database hardening, web‑server configuration, WAF deployment, and log‑analysis to protect sensitive data.

Database SecuritySQL injectionSQLMap
0 likes · 17 min read
Database Injection Attacks: Principles, Exploits, and Defense Strategies
360 Quality & Efficiency
360 Quality & Efficiency
Apr 13, 2018 · Information Security

Common Web Application Vulnerabilities and Their Attack Methods

This article introduces the most common web application vulnerabilities—including SQL injection, XSS, CSRF, file upload, file inclusion, clickjacking, and URL redirect—explaining how attackers exploit them and the potential impacts on websites and their users.

CSRFSQL injectionWeb Security
0 likes · 8 min read
Common Web Application Vulnerabilities and Their Attack Methods
ITPUB
ITPUB
Jan 3, 2018 · Information Security

How Ransomware Hijacks MySQL and What You Can Do to Stop It

The article explains how attackers compromise MySQL servers, create a WARNING table with ransom instructions demanding Bitcoin, and provides concrete SQL examples and four practical defense measures—including strong authentication, disabling public access, regular backups, and application hardening—to protect databases.

AuthenticationDatabase SecuritySQL injection
0 likes · 6 min read
How Ransomware Hijacks MySQL and What You Can Do to Stop It
MaGe Linux Operations
MaGe Linux Operations
Oct 18, 2017 · Information Security

How Zabbix Guest Access Enables Unauthenticated SQL Injection – Full Exploit Walkthrough

This article details a high‑severity SQL injection vulnerability in Zabbix’s jsrpc.php profileIdx2 parameter that allows unauthenticated attackers to gain system privileges, outlines its impact, demonstrates testing methods with screenshots, analyzes the vulnerable code paths, and recommends mitigation steps such as upgrading, patching, and disabling the guest account.

Guest accessSQL injectioninformation security
0 likes · 5 min read
How Zabbix Guest Access Enables Unauthenticated SQL Injection – Full Exploit Walkthrough