If user input is inserted without modification into an SQL query, then the application becomes vulnerable to SQL injection, like in the following example:
2.6k questions
24 answers
34 comments
16.6k users