Video upload date:  · Duration: PT1H46M27S  · Language: EN

An attacker sent commands through an iscc video

cc video for an attacker sent commands through an application's input and data fields. By doing this, the attacker was able to get the application to execute

This is a dedicated watch page for a single video.

Full Certification Question

An attacker sent commands through an application's input and data fields. By doing this, the attacker was able to get the application to execute the code he sent as part of its normal processing. The attacker was able to use this technique to get the application to expose sensitive data that he should not have access to. What type of attack was used here?