InterviewSolution
Saved Bookmarks
| 1. |
________ is exploited by influencing SQL statements that do not filter input from applications to a back-end database correctly. |
|
Answer» ________ is exploited by influencing SQL STATEMENTS that do not filter INPUT from APPLICATIONS to a backend database correctly. |
|