Problem Statement
What does an attacker exploit in an SQL Injection attack?
Explanation
SQL Injection happens when an application fails to properly validate user inputs before including them in database queries. Attackers can inject malicious SQL statements to access, modify, or delete data from the database.
For example, entering `' OR '1'='1` into a login field could trick the system into granting access without valid credentials. Preventing SQL Injection involves using parameterized queries, stored procedures, and input validation to sanitize all user inputs.
