A successful SQL injection exploit can read sensitive data from the database, modify database data (InsertUpdateDelete), execute operations on the database.SQLi occurs when an application uses invalidated user input to dynamically construct SQL query.
0 Comments
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |