veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

272
active users

#sqlinjection

1 post1 participant0 posts today
Offensive Sequence<p>🛑 CRITICAL: CVE-2025-57761 targets WeGIA &lt;3.4.10—unauthenticated SQL Injection via id_funcionario in /html/funcionario/dependente_remover.php. Upgrade to 3.4.10 or apply WAF rules ASAP! <a href="https://radar.offseq.com/threat/cve-2025-57761-cwe-89-improper-neutralization-of-s-8779f0c0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">radar.offseq.com/threat/cve-20</span><span class="invisible">25-57761-cwe-89-improper-neutralization-of-s-8779f0c0</span></a> <a href="https://infosec.exchange/tags/OffSeq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/SQLInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLInjection</span></a> <a href="https://infosec.exchange/tags/Vuln" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vuln</span></a> <a href="https://infosec.exchange/tags/WeGIA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WeGIA</span></a></p>
Wulfy<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@dangoodin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dangoodin</span></a></span> </p><p>Weird thing I observed in <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a><br>There is an incredible amount of disinterest/contempt for <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> amongst many practitioners.</p><p>This contempt extends to willful ignorance about the subject.<br>q.v. "stochastic parrots/bullshit machines" etc.</p><p>Which, in a field with hundreds of millions of users, strikes me as highly unprofessional. Just the other day I read a blog post by a renown hacker (and likely earned a mute/block) "Why I don't use AI and you should not too". </p><p>Connor Leahy, CEO of <a href="https://infosec.exchange/tags/conjecture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conjecture</span></a> is one of the few credible folks in the field. </p><p>But to the question at hand.<br>The prompts are superbly sanitised.<br>In part by design, in part due to the fact that you are not connecting to a database but to a multidimensional vector data structure.</p><p>The <a href="https://infosec.exchange/tags/prompt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prompt</span></a> is how you get in through the backdoor. Though I haven't looked into fuzzing, but I suspect because of the tech, the old <a href="https://infosec.exchange/tags/sqlinjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sqlinjection</span></a> tek and similar will not work.</p><p>Long story short; It is literally impossible to build a secure <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>. By the virtue of the tech.<br><a href="https://infosec.exchange/tags/promptengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>promptengineering</span></a> is the key to open the back door to the knowledge tree.</p><p>Then of course there are local models you can train on your own datasets. Including a stack of your old <a href="https://infosec.exchange/tags/2600magazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2600magazine</span></a> </p><p><a href="https://infosec.exchange/tags/hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hack</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a> <a href="https://infosec.exchange/tags/aisafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisafety</span></a></p>
Rad Web Hosting<p>10 Steps to Protect Your <a href="https://mastodon.social/tags/VPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPS</span></a> Against SQL Injection <br>This article provides a guide discussing how to protect your VPS against SQL injection.<br>What is SQL Injection?<br>SQL Injection is a type of cyber attack where an attacker inserts or “injects” malicious SQL code into a query through input fields, URLs, or other data entry points. If the application doesn't properly validate or sanitize the input, the ...<br>Continued 👉 <a href="https://blog.radwebhosting.com/how-to-protect-your-vps-against-sql-injection/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=mastodon.social" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.radwebhosting.com/how-to-</span><span class="invisible">protect-your-vps-against-sql-injection/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=mastodon.social</span></a> <a href="https://mastodon.social/tags/vpsguide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpsguide</span></a> <a href="https://mastodon.social/tags/postgresql" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postgresql</span></a> <a href="https://mastodon.social/tags/mariadb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mariadb</span></a> <a href="https://mastodon.social/tags/sqlinjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sqlinjection</span></a></p>
danielbrown78<p><a href="https://blackhattool.com/sqli-dumper-9-7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blackhattool.com/sqli-dumper-9</span><span class="invisible">-7/</span></a><br>SQL injection (SQLi) remains one of the most dangerous and prevalent web application vulnerabilities, allowing attackers to manipulate databases and steal sensitive information. SQLi Dumper 9.7 is a powerful, automated tool that exploits SQL injection vulnerabilities efficiently. Widely used by hackers and penetration testers, this tool streamlines finding, manipulating, and extracting data from vulnerable websites.<br><a href="https://mastodon.social/tags/SQLInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLInjection</span></a>, <a href="https://mastodon.social/tags/VulnerabilityScanner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityScanner</span></a>, <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebSecurity</span></a></p>

10 Steps to Protect Your #VPS Against SQL Injection
This article provides a guide discussing how to protect your VPS against SQL injection.
What is SQL Injection?
SQL Injection is a type of cyber attack where an attacker inserts or “injects” malicious SQL code into a query through input fields, URLs, or other data entry points. If the application doesn't properly validate or sanitize the input, the ...
Continued 👉 blog.radwebhosting.com/how-to- #sqlinjection #postgresql #vpsguide #mariadb

RadWeb, LLC · 10 Steps To Protect Your VPS Against SQL Injection - VPS Hosting Blog | Dedicated Servers | Reseller HostingHere’s a detailed guide on how to protect your VPS against SQL Injection attacks.