Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities: Difference between revisions

Line 37: Line 37:
# http://cwe.mitre.org/top25/
# http://cwe.mitre.org/top25/
# http://www.sans.org/critical-security-controls/#summary
# http://www.sans.org/critical-security-controls/#summary
#
# SQL injection vulnerabilities occur when a lack of input validation could allow a user to force unintended system behavior by altering the logical structure of a SQL statement using SQL reserved words and special characters.