Overview#
Code injection is a type of Attack of a Vulnerability that is caused by processing invalid or Unauthorized data.Code injection is used by an attacker to introduce (or "inject") data into a Operating System or Application which can either:
- with code change the course of execution
- with data using Man-In-The-Middle Attacks or Replay attacks
Code injection Examples#
- SQL Injection
- Stolen transactions codes or Secrets
- Cross-site scripting
- Install malware by injecting code
- Buffer overflows may allow Code injection
More Information#
There might be more information for this subject on one of the following:- Attack
- Cloud Native
- LSA Protection
- OAuth 2.0 Security Best Current Practice
- Proof Key for Code Exchange by OAuth Public Clients
- SQL Injection
- [#1] - Code_injection
- based on information obtained 2018-08-08-