Application dev: "yes it's an SQL injection, but it's fine because this database is only used for unimportant data"
The thing is that the real attacks usually come by chaining a bunch of vulnerabilities together.
Application dev: "yes it's an SQL injection, but it's fine because this database is only used for unimportant data"
The thing is that the real attacks usually come by chaining a bunch of vulnerabilities together.