0 votes
14 views

If user input is inserted without modification into an SQL query, then the application becomes vulnerable to SQL injection, like in the following example:

Please log in or register to answer this question.

...