Skip to content
Search
  • Home
  • Courses
  • Certifications
  • About Us
  • Log In
Cyber-Recon
Search
  • Home
  • Courses
  • Certifications
  • About Us
  • Log In
Cyber-Recon
Share This
Tweet

An injection attack, an attacker supplies untrusted input to a program. This input gets processed by an interpreter as part of a command or query. In turn, this alters the execution of that program. -acunetix.com

Related Articles:
  • Types of Attacks Flash Cards
  • Impact Associated with Types of Vulnerabilities Flash Cards
« Back to Glossary Index

Join Cyber-Recon Today!

Your Home For Cyber-Security and Information Technology Training

Start Learning
Copyright © 2025 Cyber-Recon
Powered by Cyber-Recon