Skip to main content

Questions tagged [string]

related to vulnerabilities in string manipulation libraries (ex.: causing a buffer overflow by omitting the null terminator), or related to sanitizing input strings.

Filter by
Sorted by
Tagged with
0 votes
0 answers
100 views

I see there are forums about this question, but everywhere, I fail to see the answer I am looking for. I have a stored procedure which its purpose is to execute dynamic SQL statement. It uses a cursor ...
Xanadu's user avatar
  • 1
0 votes
0 answers
27 views

I have a personal id "U1KFhYtMqZhCYya6sy31PVLM8DlM5HLCkwy3", I have checked some hash functions but cannot make sure how this generated? Is this just random string generated with [a-zA-z0-9]?...
Slybot's user avatar
  • 101
5 votes
2 answers
554 views

Suppose that we have this code (in TypeScript syntax): function one(str: string): string { // do something with the string return str } function two() { let s = getSomeString() // returns some ...
trusktr's user avatar
  • 81
1 vote
0 answers
191 views

Go and Java have "compile time constants", and JavaScript will soon get a feature that allows "Distinguishing strings from a trusted developer from strings that may be attacker ...
Craig Francis's user avatar
0 votes
0 answers
211 views

When parsing a string to a BigDecimal or BigInteger in Java, or BigInt in JavaScript, are there any known security issues around this? Like if you take in the string without validating it's just ...
scaly's user avatar
  • 101
5 votes
1 answer
15k views

I'm new to buffer overflow exploitation. I've written a simple C program which will ask the user to input a string (as a password) and match that string with "1235". If matched then it will ...
Abhirup Bakshi's user avatar
0 votes
1 answer
1k views

I want to know how to find just the first character or digit in first part of a 64 length string from a MD5 hash. For example, we have a hash: ...
Hassi's user avatar
  • 11
0 votes
3 answers
669 views

When attempting to obfuscate strings in a modern program, xor is probably the most common option. By this I mean running each char of a string through a function which xors the char with some given ...
the_endian's user avatar
  • 1,362
4 votes
2 answers
965 views

Is the exploitation of a format string vulnerability possible if the number of characters you're allowed to enter is limited? Let's say I'm just allowed to enter input with 23 characters. I can read ...
Stjubit's user avatar
  • 41
2 votes
2 answers
570 views

In general which is safer to use, with regards to XSS evasion in particular? echo '<input name="'.$input_name.'">'; echo "<input name='$input_name'>"; I'm guessing single quotes, but ...
admcfajn's user avatar
  • 167
2 votes
2 answers
1k views

How secure is it to pass in to a Stripe website (external, not our own site) some data to prefill a form through the query string? It's an external site so we can't just pass it in encrypted like we ...
L_Church's user avatar
  • 123
-1 votes
1 answer
541 views

Please I need help, I bought a PHP mailer, hosted it on my server and found out that it copies all messages and maillist to a different email address, I examined the code and became suspicious about ...
Pat Mike's user avatar
4 votes
1 answer
720 views

I have the following scenario: printf is called with a 20 byte long string (19 characters + 0x00) which I control. The string cannot contain n, s, S and $. My goal is to bypass a strcmp with a random ...
Timo89's user avatar
  • 171
0 votes
1 answer
1k views

I am working on a ctf (capture the flag) challenge and I have a string that I believe is important, but I don't know what encoding it is in. Is there a way I can decode the string in all of the ...
MikeSchem's user avatar
  • 2,401
1 vote
0 answers
184 views

Recently, I read some papers about DB Outsourcing that implement aggregate functions over encrypted data. What I want to know, is there a method in DB Outsourcing to implement SQL LIKE operator that ...
ThisIsMe's user avatar
7 votes
1 answer
10k views

It's a well known fact that C# string is pretty insecure, it's not pinned in RAM, the Garbage Collector can move it, copy it, leave multiple traces of it in RAM and the RAM can be swapped and be ...
mFeinstein's user avatar
2 votes
0 answers
499 views

If we have a code like printf(buffer) where the user can control the buffer, I understand that the user could insert something like AAAA%08x%08x%08x... and would as the output get the content of a ...
pineappleman's user avatar
  • 2,309
5 votes
2 answers
816 views

I'm just starting out to learn about fuzzing and have made a dumb fuzzer that changes several random bytes in a pdf file to random values, opens it and detects if Acrobat Reader has crashed. What ...
pineappleman's user avatar
  • 2,309