CAPEC-66: SQL Injection
This attack exploits target software that constructs SQL statements based on user input. An attacker crafts input strings so that when the target software constructs SQL statements based on the input, the resulting SQL statement performs actions other than those the application intended. SQL Injection results from failure of the application to appropriately validate input.
Severity
High
Likelihood
High
12
/ 100
low-risk
Active Threat
10/50 · Low
Exploit Availability
2/50 · Minimal