You are conducting a penetration test on a web application recently purchased by the HR department of your employer. You find that when creating a new user account in the Web UI you can delete data from the database by entering '; DROP TABLE Users' into the field for the user account. What type of vulnerability have you discovered?
Threats, Attacks and Vulnerabilities | |
Technologies and Tools | |
Architecture and Design | |
Identity and Access Management | |
Risk Management | |
Cryptography and PKI |