ethical-hacker video for during an audit, a security analyst discovers that input fields accept SQL commands directly. What type of vulnerability is this?
During an audit, a security analyst discovers that input fields accept SQL commands directly. What type of vulnerability is this?