Register now or log in to join your professional community.
It is a security vulnerability while developing database centric web pages, where the intruder may rewrite the url request in such a way the queries the database and retrieve sensitive data.
Database providers have come up with programming model to avoid such vulnerability.