logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Evolving Threat Landscape of Hacktivism in Colombia
  • Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
  • The Transformative Power of Artificial Intelligence in Healthcare
  • Bug Bounty Reconnaissance Framework: help you coordinate your reconnaissance workflows across multiple devices
  • Phishing remained the top identity abuser in 2022: IDSA report

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-2879 (wireshark) 26 May 2023
  • CVE-2023-2857 (wireshark) 26 May 2023
  • CVE-2023-2858 (wireshark) 26 May 2023
  • CVE-2023-2856 (wireshark) 26 May 2023
  • CVE-2023-2854 (wireshark) 26 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

ScanQLi – Scanner To Detect SQL Injection Vulnerabilities

Posted on 1 May 2019

From kitploit.com

ScanQLi is a simple SQL injectionscanner with somes additionals features. This tool can’t exploit the SQLi, it just detect them. Tested on Debian 9
Features

  •  Classic
  •  Blind
  •  Time based
  •  GBK (soon)
  •  Recursive scan (follow all hrefs of the scanned web site)
  •  Cookies integration
  •  Adjustable wait delay between requests
  •  Ignore given URLs

Read more…

Posted in News

Post navigation

Previous post: CISA Releases Binding Operational Directive on Vulnerability Remediation
Next post: Over Dozen Popular Email Clients Found Vulnerable to Signature Spoofing Attacks
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.