Home > database >  Oracle - select an XML information field how to remove the <table> and </table> informat
Oracle - select an XML information field how to remove the <table> and </table> informat

Time:12-07

The Oracle database select queries, there is a column to store XML information. How to write the expression, removes a: (1) & lt; Table> , (2) & lt;/table> , (3) and & lt; Table> And & lt;/table> The information between them?

Select
X,
Y,
regexp_replace (XML, 'XXX', ')
The from
Xx

Note: the XML field for storing XML information fields, some record table, content is very big, want to put the table in the query phase information, remove

Regular expressions should be how to write here? Thank you,

example:
& lt; p> These issues include: & lt;/p>

& lt; Table & gt;



CVE - 2019-1010238 & lt;/td>
9.8 (& lt; A href="https://cvssjs.github.io/#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" & gt; The CVSS: 3.0/AV: N/AC: L/PR: N/UI: N/S: U/C: H/I: H/A: H)
Gnome 1.42 and later Pango is affected by: Buffer Overflow, The impact is: The heap -based Buffer Overflow can be 2 get code execution. The component is: The function name: pango_log2vis_get_embedding_levels, The assignment of nchars and The loop condition. The attack vector is: bugs can be informs The when application pass invalid utf-8 strings to functions provides The like pango_itemize. & lt;/td>


CVE - 2019-3462 & lt;/td>
8.1 (& lt; A href="https://cvssjs.github.io/#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" & gt; The CVSS: 3.0/AV: N/AC: H/PR: N/UI: N/S: U/C: H/I: H/A: H)
Incorrect sanitation of the 302 redirect the field in the HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to the remote code execution on the target machine. & lt;/td>


CVE - 2019-9924 & lt;/td>
7.8 (& lt; A href="https://cvssjs.github.io/#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" & gt; The CVSS: 3.0/AV: L/AC: L/PR: L/UI: N/S: U/C: H/I: H/A: H)
4.4 beta 2 rbash Bash in before did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell. & lt;/td>


& lt;/table>
]] & gt;
  • Related