2008年4月25日
摘要: How can an attacker exploit a PL/SQL procedure that doesn’t even take user input? Or how does one do SQL injection using DATE or even NUMBER data types? In the past this has not been possible but as this paper will demonstrate, with a little bit of trickery, you can in the Oracle RDBMS. 阅读全文
posted @ 2008-04-25 17:06 尚書 阅读(578) 评论(0) 推荐(0)