tag:blogger.com,1999:blog-1152299631250525001.post4963067685122752312..comments2023-02-08T03:03:05.693-08:00Comments on Cosine Security: Abusing TSQL Cursors for massive SQL Injectionthelightcosinehttp://www.blogger.com/profile/03060233785644761709noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-1152299631250525001.post-31735533335644438692010-12-12T03:52:43.092-08:002010-12-12T03:52:43.092-08:00Subject of your post is very interesting.I 'd ...Subject of your post is very interesting.I 'd love to read more.Please make the next post here, i 'll be waiting for that.I am Enric Brown I am community member of<br /><br />http://eduanejones.combestsecurityhttps://www.blogger.com/profile/08913414026765911315noreply@blogger.comtag:blogger.com,1999:blog-1152299631250525001.post-62208387590519681402010-11-09T08:31:19.938-08:002010-11-09T08:31:19.938-08:00thanks for sharing some more details. As i said, I...thanks for sharing some more details. As i said, I didn't believe in the slightest that this was new. Just new to me, so i thought I'd share it for anyone else who was unaware of the techniquethelightcosinehttps://www.blogger.com/profile/03060233785644761709noreply@blogger.comtag:blogger.com,1999:blog-1152299631250525001.post-82292884705308198412010-11-07T12:04:15.438-08:002010-11-07T12:04:15.438-08:00This was researched and discussed 2.5 years ago:
...This was researched and discussed 2.5 years ago:<br /><br />http://chaptersinwebsecurity.blogspot.com/2008/07/asprox-silent-defacement.htmlASPROXhttp://chaptersinwebsecurity.blogspot.com/2008/07/asprox-silent-defacement.htmlnoreply@blogger.com