Sqlity.net, 2014

Common Database Vulnerabilities: Privilege Abuse

Type

Blog Post

Year

2014

Authors

Sqlity.net

Identifiers

N/A

Abstract

Privilege Abuse comes in two flavors: Abuse of excessive privileges and abuse of legitimate privileges. In this article, I am going to attempt covering both.

Links

Citation

sqlity.net, 2014. Common Database Vulnerabilities: Privilege Abuse. sqlity.net. URL https://sqlity.net/en/2542/privilege-abuse/ (accessed 1.19.21).

 


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.