摘要:
How can an attacker exploit a PL/SQL procedure that doesn’t even take user input? Or
how does one do SQL injection using DATE or even NUMBER data types? In the past
this has not been possible but as this paper will demonstrate, with a little bit of trickery,
you can in the Oracle RDBMS. 阅读全文
posted @ 2008-04-25 17:06
尚書
阅读(578)
评论(0)
推荐(0)
浙公网安备 33010602011771号