menu
Qammunity
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Which weakness of web sites to launch attacks does an sql injection technique exploit?
asked
Nov 13, 2018
75.8k
views
3
votes
Which weakness of web sites to launch attacks does an sql injection technique exploit?
Computers and Technology
high-school
AkaBase
asked
by
AkaBase
7.4k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
4
votes
Not sanitizing input before passing it into a database query.
Kcnygaard
answered
Nov 18, 2018
by
Kcnygaard
8.5k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
May 9, 2024
202k
views
The most common input-related vulnerability is called the A) Buffer Overflow B) Cross-Site Scripting C) SQL Injection D) Zero-Day Exploit
Isaac Saffold
asked
May 9, 2024
by
Isaac Saffold
7.8k
points
Computers and Technology
high-school
1
answer
5
votes
202k
views
asked
Aug 14, 2024
216k
views
The exploit or attack known as ________ can be used to cause a DoS, confuse an IDS, or bypass firewall filtering? 1) SQL Injection 2) Cross-Site Scripting (XSS) 3) Buffer Overflow 4) Denial of Service
Cherron
asked
Aug 14, 2024
by
Cherron
8.3k
points
Computers and Technology
high-school
1
answer
0
votes
216k
views
asked
Mar 7, 2021
22.8k
views
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as:___________ a) IV attack b) SQL injection c) Buffer overflow d) Fuzz test
Adriaan Koster
asked
Mar 7, 2021
by
Adriaan Koster
9.3k
points
Social Studies
high-school
1
answer
4
votes
22.8k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Disadvantages of using animation in advertising? advantages and disadvantages of using animation for education? advantages and disadvantages of using animation in entertainment?
Explain why binary codes are used to represent characters, numbers and symbols :)
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qammunity