asked 72.8k views
4 votes
Bob is developing a web application that depends upon a database backend. what type of attack could a malicious individual use to send commands through his web application to the database?

asked
User Yolima
by
7.7k points

1 Answer

0 votes
Evil user can do SQL Injections to destroy the database by typing query commands in the form provided by the application that have relation with the database.
answered
User Tamica
by
8.6k points