Saurav Sarkar:
>Our application is free of any kind of SQL injection

Famous last words.  :)

>as we don't have any input fields.

So where does your data come from?
Does your application have any interface that an attacker
could access?

How do you create your SQL statements?
Are you always using bound parameters?

>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3414

This requires the attacker to control a collation name.

>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3415

This requires the attacker to control the CHECK clause in a CREATE
TABLE statement.

>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3416

This requires the attacker to control the format string of the print()
SQL function.


Regards,
Clemens

Reply via email to