Sqlity.net, 2014
Common Database Vulnerabilities: Privilege Abuse
Type
Blog Post
Year
2014
Authors
Sqlity.net
Identifiers
N/A
Abstract
Privilege Abuse comes in two flavors: Abuse of excessive privileges and abuse of legitimate privileges. In this article, I am going to attempt covering both.
(https://sqlity.net/en/2542/privilege-abuse/, accessed 19 Jan 2021)
Links
Citation
sqlity.net, 2014. Common Database Vulnerabilities: Privilege Abuse. sqlity.net. URL https://sqlity.net/en/2542/privilege-abuse/ (accessed 1.19.21).
Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.
This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.