Esteban Martínez Fayó

– 1) get around the need to create a function to inject and use this vulnerable function to inject the SQL statements. To do this the vulnerability must be in an anonymous PL/SQL block of an AUTHID CURRENT_USER function (in order to be able to define the transaction as autonomous). – 2) execute SQL statements in a web application vulnerable to ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download