The injectionphase-locked method introduced in this paper can be used to overcome this disadvantage.
介绍了用注入锁相的方法来弥补这个缺陷。
2
An attacker may use directory traversal and cross-site ccripting during a scan phase and then hit it with an SQL injection or an RFI in the exploit phase.