Code injection (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Code injection" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
5th place
5th place
2nd place
2nd place
low place
low place
11th place
8th place
4th place
4th place
702nd place
520th place
18th place
17th place
355th place
454th place
2,187th place
1,500th place
207th place
136th place
low place
low place
1,514th place
1,024th place
low place
low place
low place
low place
222nd place
297th place
6th place
6th place
low place
low place
low place
low place
4,194th place
3,676th place
low place
low place
3,018th place
1,865th place
14th place
14th place
low place
low place

archive.org

archive.today

asu.edu

public.asu.edu

  • Srinivasan, Raghunathan. "Towards More Effective Virus Detectors" (PDF). Arizona State University. Archived from the original (PDF) on 29 July 2010. Retrieved 18 September 2010. Benevolent use of code injection occurs when a user changes the behaviour of a program to meet system requirements.

blackhat.life

doi.org

fort-knox.org

harvard.edu

ui.adsabs.harvard.edu

karmainsecurity.com

moertel.com

blog.moertel.com

nih.gov

ncbi.nlm.nih.gov

pubmed.ncbi.nlm.nih.gov

nist.gov

web.nvd.nist.gov

oracle.com

docs.oracle.com

owasp.org

php.net

uk3.php.net

portswigger.net

psu.edu

citeseerx.ist.psu.edu

rafalcieslak.wordpress.com

seclists.org

semanticscholar.org

api.semanticscholar.org

uiowa.edu

cs.uiowa.edu

upenn.edu

  • "Top 10 Web Application Security Vulnerabilities". Penn Computing. University of Pennsylvania. Archived from the original on 24 February 2018. Retrieved 10 December 2016.

web.archive.org

  • "Top 10 Web Application Security Vulnerabilities". Penn Computing. University of Pennsylvania. Archived from the original on 24 February 2018. Retrieved 10 December 2016.
  • "OWASP Top 10 2013 A1: Injection Flaws". OWASP. Archived from the original on 28 January 2016. Retrieved 19 December 2013.
  • "NVD - Statistics Search". web.nvd.nist.gov. Archived from the original on 15 December 2023. Retrieved 9 December 2016.
  • Srinivasan, Raghunathan. "Towards More Effective Virus Detectors" (PDF). Arizona State University. Archived from the original (PDF) on 29 July 2010. Retrieved 18 September 2010. Benevolent use of code injection occurs when a user changes the behaviour of a program to meet system requirements.
  • "Dynamic linker tricks: Using LD_PRELOAD to cheat, inject features and investigate programs". Rafał Cieślak's blog. 2 April 2013. Archived from the original on 25 December 2021. Retrieved 10 December 2016.
  • "The Java EE 6 Tutorial: Chapter 35 Using the Criteria API to Create Queries". Oracle. Archived from the original on 11 November 2013. Retrieved 19 December 2013.
  • Moertel, Tom (18 October 2006). "A type-based solution to the "strings problem": a fitting end to XSS and SQL-injection holes?". Tom Moertel's Blog. Archived from the original on 6 August 2013. Retrieved 21 October 2018.
  • "HttpOnly". OWASP. 12 November 2014. Archived from the original on 26 December 2008. Retrieved 10 December 2016.
  • "SQL Injection Prevention Cheat Sheet". OWASP. Archived from the original on 20 January 2012. Retrieved 10 December 2016.
  • Philippaerts, Pieter; et al. (1 June 2013). "CPM: Masking Code Pointers to Prevent Code Injection Attacks" (PDF). ACM Transactions on Information and System Security. 16 (1): 1–27. doi:10.1145/2487222.2487223. ISSN 1094-9224. S2CID 10947780. Archived (PDF) from the original on 24 February 2021. Retrieved 21 October 2018.
  • "Server-Side Template Injection". PortSwigger Research. 5 August 2015. Archived from the original on 22 May 2022. Retrieved 22 May 2022.
  • Christey, Steven M. (3 May 2006). "Dynamic Evaluation Vulnerabilities in PHP applications". Full Disclosure (Mailing list). Archived from the original on 13 November 2009. Retrieved 21 October 2018.
  • "Unserialize function warnings". PHP.net. Archived from the original on 9 May 2015. Retrieved 6 June 2014.
  • "Analysis of the Joomla PHP Object Injection Vulnerability". Archived from the original on 2 March 2013. Retrieved 6 June 2014.
  • [OWASP "Command Injection"]. Archived from the original on 20 December 2013. Retrieved 19 December 2013. {{cite web}}: Check |url= value (help)
  • Douglas W. Jones, CS:3620 Notes, Lecture 4—Shell Scripts. Archived 24 September 2024 at the Wayback Machine, Spring 2018.

wiley.com

onlinelibrary.wiley.com

worldcat.org

search.worldcat.org