Home / Vulnerability Database / PL or SQL : Resource injection
PL/SQL

PL or SQL : Resource injection

Classification

Overview

Using data from an untrusted source to identify the resource allows an attacker to view or modify protected system resources.

The injection when working with resources (resource injection) occurs when an attacker can specify the identifier to access the system resources. This allows him/her in particular to transfer valuable data to a third party server.

MEDIUM

DerScanner Severity Score

Do you want to fix PL or SQL : Resource injection in your application?

See also

PL/SQL

PL or SQL : Open redirect

PL/SQL

PL or SQL : Cross-site scripting (XSS)

PL/SQL

PL or SQL : Weak hashing algorithm