Difficulty: Easy
Average Score: 100%

During a SQL update of a database, a temporary field used as part of the update sequence was modified by an attacker before the update completed in order to allow access to the system. Which of the following best describes this type of vulnerability?

Report an Issue

Help us improve by flagging this content.

Rate this Practice Test

How helpful was this material?

Chat on WhatsApp