logo

Crowdly

Browser

Add to Chrome

Partant du postulat qu'une requête de connexion est construite de la sorte : SEL...

✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.

Partant du postulat qu'une requête de connexion est construite de la sorte : SELECT id FROM users WHERE name = "toto" AND password = "DHZ27821679". Un attaquant peut contourner la connexion en injectant cette payload dans le champs name :
0%
0%
0%
0%
More questions like this

Want instant access to all verified answers on ametice.univ-amu.fr?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome