N Khochare, S Chalurkar, S Kakade… - International Journal of …, 2011 - Citeseer
SQL injection is most common methodology employed by a hacker to exploit vulnerabilities
in software applications. Vulnerabilities are basically weak links in the software that exposes …