Blog

SQL Injection (SQLi)

SQL Injections, which have been appearing in the OWASP Top-10 for years, are basically unsanitized user input vulnerabilities. These maliciously complied SQL statements are used to illegally communicate with the application’s database for harvesting information, manipulating data and in many cases even assuming full control of the application data. The most common exploitations take place via log-in fields of unprotected web and mobile applications. Since all modern applications (web and mobile) use centralized databases to deliver and render information, such hacking opportunities exist in many leading e-commerce, social and financial websites and applications. Read More  

About the Author

About the Author

Never miss an update. Subscribe today!

By submitting my information to Checkmarx, I hereby consent to the terms and conditions found in the Checkmarx Privacy Policy and to
the processing of my personal data as described therein. By clicking submit below, you consent to allow Checkmarx
to store and process the personal information submitted above to provide you the content requested.
Skip to content