A1- Injection

Description

Injection flaws occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.

  • Exploitability: EASY
  • Prevalence: COMMON
  • Detectability: AVERAGE
  • Technical Impact: SEVERE