<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>blog.joaomorais.com &#187; Security</title>
	<atom:link href="http://blog.joaomorais.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.joaomorais.com</link>
	<description>Blog about software development, personal projects and development tools.</description>
	<lastBuildDate>Mon, 10 Apr 2017 02:26:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>SQL Column Truncation Vulnerabilities</title>
		<link>http://blog.joaomorais.com/sql-column-truncation-vulnerabilities/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sql-column-truncation-vulnerabilities</link>
		<comments>http://blog.joaomorais.com/sql-column-truncation-vulnerabilities/#comments</comments>
		<pubDate>Sat, 20 Sep 2008 11:24:49 +0000</pubDate>
		<dc:creator>João Morais</dc:creator>
				<category><![CDATA[Papers]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[Truncation]]></category>
		<category><![CDATA[Vulnerabilities]]></category>

		<guid isPermaLink="false">http://solidlocker.webhs.org/wordpress/?p=63</guid>
		<description><![CDATA[One of the biggest concerns for Web Developers while developing something with SQL, is to avoid SQL-Injection problems, because those are the most common security flaws. But there are also another flaws that you should be aware about, for example, column truncation vulnerabilities. This security flaw it&#8217;s related with the lack of input length validations [...]]]></description>
				<content:encoded><![CDATA[<p>One of the biggest concerns for Web Developers while developing something with SQL, is to avoid <a title="SQL-Injection" href="http://en.wikipedia.org/wiki/SQL_injection">SQL-Injection</a> problems, because those are the most common security flaws.</p>
<p>But there are also another flaws that you should be aware about, for example, column truncation vulnerabilities.</p>
<p>This security flaw it&#8217;s related with the lack of input length validations and it seems that it is affecting a lot of known applications.</p>
<p>Stefan Esser wrote a great <a title="MySQL and SQL Column Truncation Vulnerabilities" href="http://www.suspekt.org/2008/08/18/mysql-and-sql-column-truncation-vulnerabilities/">tutorial</a> about this subject it&#8217;s a must read.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.joaomorais.com/sql-column-truncation-vulnerabilities/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Joomla! 1.5.6 Released</title>
		<link>http://blog.joaomorais.com/joomla-1-5-6-released/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=joomla-1-5-6-released</link>
		<comments>http://blog.joaomorais.com/joomla-1-5-6-released/#comments</comments>
		<pubDate>Thu, 14 Aug 2008 12:02:41 +0000</pubDate>
		<dc:creator>João Morais</dc:creator>
				<category><![CDATA[Software]]></category>
		<category><![CDATA[CMS]]></category>
		<category><![CDATA[Joomla!]]></category>
		<category><![CDATA[Patch]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerabilities]]></category>

		<guid isPermaLink="false">http://solidlocker.webhs.org/wordpress/?p=243</guid>
		<description><![CDATA[Till a couple of days now I was using Joomla! 1.5.5 but yesterday a new release came out. This new release is a security release made to solve a high level security issue, then it&#8217;s recommended to upgrade immediately. Some websites are already being owned because of this security flaw, do not risk to get [...]]]></description>
				<content:encoded><![CDATA[<p>Till a couple of days now I was using <a title="Joomla!" href="http://www.joomla.org/">Joomla!</a> 1.5.5 but yesterday a new release came out.</p>
<p>This new release is a security release made to solve a high level security issue, then it&#8217;s recommended to upgrade immediately.</p>
<p>Some websites are already being owned because of this security flaw, do not risk to get owned too and update your website software as soon as possible.</p>
<p>If you need help read the migration/upgrade instructions in <a title="Joomla! 1.5.6 Released" href="http://www.joomla.org/announcements/release-news/5199-joomla-156-released.html">here</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.joaomorais.com/joomla-1-5-6-released/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
