Answer:
SQL injection.
Step-by-step explanation:
SQL injection is a way to exploit vulnerabilities in the handling of input data in some computer programs that work against a database. The injection takes place by a user submitting parameters to a database query, without the parameters being correctly transformed with respect to special characters, such as escape sequences. With custom parameters, a user can bypass login systems and manipulate data.