A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?
An application that does not validate user input is particularly susceptible to SQL injection attacks. In an SQL injection attack, an attacker can insert or 'inject' a SQL query via the input data from the client to the application. Due to the lack of validation, the malicious SQL commands are executed by the database server, leading to unauthorized access or manipulation of the database.
Kris
7 months agoGlen
7 months agoTran
7 months agoKris
7 months agoCarlene
8 months agoGlen
8 months agoZoila
8 months agoCarissa
7 months agoSarina
7 months agoMartina
8 months agoAdria
8 months agoGretchen
8 months agoElly
8 months agoAmos
8 months agoHerman
8 months agoCarlene
8 months ago