The vulnerability that occurs when data entered by an untrusted user is sent to an interpreter as
Answers
Answered by
0
Answer:
Injection occurs when the user input is sent to an interpreter as part of command or query and trick the interpreter into executing unintended commands and gives access to unauthorized data. The SQL command which when executed by web application can also expose the back-end database.Apr
Answered by
3
Answer:
sorry i don't know......
Similar questions