Third International Conference on Advances in Computing, Electronics and Communication - ACEC 2015 2015
DOI: 10.15224/978-1-63248-064-4-23
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the SQL injection vulnerabilities of bd domain web applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 8 publications
(14 reference statements)
0
1
0
Order By: Relevance
“…This syntax comments out any query written after --+. Thus the authorized query is blocked [7]. The next step is injection query to get un authorized data.…”
Section: Injection Vulnerabilitiesmentioning
confidence: 99%