Title here
Summary here
SQL injection allows attackers to execute malicious SQL queries through user input areas, potentially accessing, modifying, or deleting data.
DBMS | Query | Output (example) |
---|---|---|
SQLite | SELECT sqlite_version() | 3.42.0 |
MySQL | SELECT VERSION() | 5.7.38 |
PostgreSQL | SELECT version() | PostgreSQL 14.8 … |
PostgreSQL | SQLite | MySQL |
---|---|---|
'a'||'b' | 'a'||'b' | 'a' 'b' |
POW(3,2) | POW(3,2) | POW(3,2) |
CHR(65) | CHAR(65) | CHAR(65) |
ASCII('A') | UNICODE('A') | ASCII('A') |
SUBSTR('abc',2,1) | SUBSTR('abc',2,1) | SUBSTR('abc',2,1) |
PG_SLEEP(4) | Unknown | SLEEP(4) |
SIMILAR TO , ~ | REGEXP , GLOB | REGEXP |
sqlite3
- Docs