An exampleWe accept user and password and validate likeselect 1 from users where username = 'username' and password = 'pwd';What if username string is passed like [x' or 1=1; --]select 1 from users where username = 'x' or 1=1; --' and password = 'pwd';
SQL Injection happens when a developer accepts user input that is directly placed into a SQL Statementand doesn't properly filter out dangerous characters. This can allow an attacker to not only stealdata from your database, but also modify and delete it.
Configuration Manager is responsible for implementing the configuration control procedures in the project. The CM shall 1)Plan, monitor and report on all configuration management aspects of the proje...
jyoshna
Nov 17th, 2005
role of configuration manager is to approve change requests,analyze changes,archive documents at archival points,maintainance of configuration library,check in,check out