Beginners Guide to
Application Security

Beginners Guide to
Application Security

SQL Injection (SQLi)

SQL Injection (SQLi)

SQL Injections, which have been appearing in the OWASP Top-10 for years, are basically unsanitized user input vulnerabilities. These maliciously complied SQL statements are used to illegally communicate with the application’s database for harvesting information, manipulating data and in many cases even assuming full control of the application data.

The most common exploitations take place via log-in fields of unprotected web and mobile applications. Since all modern applications (web and mobile) use centralized databases to deliver and render information, such hacking opportunities exist in many leading e-commerce, social and financial websites and applications.

Read More

 

The following two tabs change content below.

Dina Shkolnik

Latest posts by Dina Shkolnik (see all)

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.