Computer Science, asked by Saiyam5395, 11 months ago

The vulnerability that occurs when data entered by an untrusted user is sent to an interpreter as

Answers

Answered by reetagupta57
0

Answer:

Injection occurs when the user input is sent to an interpreter as part of command or query and trick the interpreter into executing unintended commands and gives access to unauthorized data. The SQL command which when executed by web application can also expose the back-end database.Apr

Answered by AaditiRaj
3

Answer:

sorry i don't know......

Similar questions