Home / Vulnerability Database / T-SQL : Code injection
T-SQL

T-SQL : Code injection

Overview

The application uses external code, which may have originated from an untrusted source. Interpretation and execution of the data from an untrusted source at runtime allows an attacker to execute malicious code in the context of the application.

Client side code injection attacks take the first place in the “OWASP Top 10 2017” web application vulnerabilities ranking and the seventh place in the “OWASP Mobile Top 10 2014” ranking. The level of potential damage from such an attack depends on the user input validation performance and file protection mechanisms.

MEDIUM

DerScanner Severity Score

Do you want to fix T-SQL : Code injection in your application?

See also

T-SQL

T-SQL : Weak encryption algorithm

T-SQL

T-SQL : Weak hashing algorithm

T-SQL

T-SQL : Weak random number generator