Databases Reference
In-Depth Information
The following screenshot shows the low chart that shows how to start
assessing vulnerability:
Insecure use of variables
To start, I would like to mention that this example can be found at the
following location:
http://www.oracle.com/technetwork/issue-archive/2009/09-jul/
o49browser-091379.html
In Application Builder , click on Create Page , select Blank Page as the page type,
and click twice on Next .
1.
Enter SQL Injection for Name , click twice on Next , and click on Finish .
2.
Click on Edit Page .
3.
In the Regions area, click on the Create icon, select HTML , click on Next ,
select HTML again, and click on Next .
 
Search WWH ::




Custom Search