Cyber Attacks Based on Data Injection

software vulnerabilities, SQL injection, command injection

Authors

  • Alexandru-Marius SIMION
    alexandru.simion95@stud.etti.upb.ro (Primary Contact)
    University Politehnica of Bucharest, Romania
2021-04-30

Downloads

Software vulnerabilities represent the most important vulnerabilities due to their impact compared to other vulnerabilities such as hardware and network ones. Throughout the years many vulnerabilities have been identified, classified, and registered by organizations such as MITRE as a CVE (common vulnerability or exposure) and assigned a Common Vulnerability Scoring System (CVSS) score to reflect the potential risk it could introduce to organizations. This paper describes, analyses, and provides solutions to the effects of the top three most dangerous system vulnerabilities such as: SQL injection and Command Injection.