You are conducting a penetration test on a web application recently purchased by the HR department of your employer. You find that when creating a new user account in the Web UI you can delete data from the database by entering '; DROP TABLE Users' into the field for the user account. What type of vulnerability have you discovered?
|Threats, Attacks and Vulnerabilities|
|Technologies and Tools|
|Architecture and Design|
|Identity and Access Management|
|Cryptography and PKI|