A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?
An application that does not validate user input is particularly susceptible to SQL injection attacks. In an SQL injection attack, an attacker can insert or 'inject' a SQL query via the input data from the client to the application. Due to the lack of validation, the malicious SQL commands are executed by the database server, leading to unauthorized access or manipulation of the database.
Kris
12 months agoGlen
12 months agoTran
12 months agoKris
1 years agoCarlene
1 years agoGlen
1 years agoZoila
1 years agoCarissa
1 years agoSarina
1 years agoMartina
1 years agoAdria
1 years agoGretchen
1 years agoElly
1 years agoAmos
1 years agoHerman
1 years agoCarlene
1 years ago