Showing 1 articles

Showing 1 articles

#1

Connection String Injection



Applications use connection strings to specify credentials used to access databases. If the application includes unvalidated user input in connection strings, an attacker may be able to change what da...

Filter by

Technology

Phase

Type