Answer:
Attackers can inject SQL queries that manipulate the authentication logic to bypass authentication mechanisms.
Attackers can inject SQL queries that manipulate the authentication logic to bypass authentication mechanisms.
You may be interested in:
Web Security MCQs