Showing 1 articles

Implementationx

Showing 1 articles

Implementationx
#1

Connection String Injection



Applications use connection strings to specify credentials used to access databases. If the application includes unvalidated user input in connection strings, an attacker might be able to change what...

Filter by

Technology

Phase

Type