Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.
It is a security vulnerability while developing database centric web pages, where the intruder may rewrite the url request in such a way the queries the database and retrieve sensitive data.
Database providers have come up with programming model to avoid such vulnerability.