Home / Vulnerability Database / Java : SQL injection: parameter tampering
Java

Java : SQL injection: parameter tampering

Overview

The application executes an SQL query using a parameter received from the user without additional filtering. An attacker could gain access to information about other users. With such a direct request for information, for example, by bank account number, an attacker can steal confidential information (for example, a bank account balance) using a direct link to the object.

LOW

DerScanner Severity Score

Do you want to fix Java : SQL injection: parameter tampering in your application?

See also

Java

Java : Race condition

Java

Java : Text4Shell Vulnerability

Java

Java : JNI usage