Home / Vulnerability Database / Java : SQL injection: parameter tampering
Java
Java : SQL injection: parameter tampering
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
Overview
The application executes an SQL query using a parameter received from the user without additional filtering. An attacker could gain access to information about other users. With such a direct request for information, for example, by bank account number, an attacker can steal confidential information (for example, a bank account balance) using a direct link to the object.
LOW
DerScanner Severity Score
Do you want to fix Java : SQL injection: parameter tampering in your application?
See also
Java
Java : Race condition
Java
Java : Text4Shell Vulnerability
Java
