answersLogoWhite

0

Database is vulnerable because it collects, maintains, and disseminates information. These data essentially include exploitability and potential impact. Example of this is the Open Source Vulnerability Database.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

How do you escape database queries with PHP?

Use mysql_real_escape_string(), after you've connected to your database. If that function doesn't work, use mysql_escape_string() or addslashes(). Never leave your database input vulnerable to attack.


Which is not an advantage of using database software?

One disadvantage of using database software is the complexity and cost associated with its implementation and maintenance. Setting up a database system often requires specialized knowledge and training, which can lead to increased operational costs. Additionally, database systems can be vulnerable to data breaches if not properly secured, posing risks to sensitive information.


What kind of application in MS Access?

It is a database application.It is a database application.It is a database application.It is a database application.It is a database application.It is a database application.It is a database application.It is a database application.It is a database application.It is a database application.It is a database application.


What are incubuses vulnerable to?

They are vulnerable to vulnerable people


Enter on the database or in the database?

We would use in rather than on. Data is stored in a database, not on a database. Data is entered into a database not onto a database.


What is a derived database?

We know what is database, it is a collection records. When a database is created from the existing database it is known as derived database.


What is the difference between database and database administrator?

Database is the data stored in the server and Database administrator is the person who designs the database.


Is the lamport hash protocol vulnerable to database disclosure?

No, it is safe. Even if the attacker would have seen the hashes he wouldn't be able to recreate the hash because the user's secret is still secret. Watch out for the small n attack though.


Is a painted turtle vulnerable?

To what is it vulnerable?


What is the range of database application?

The range of database application are given below: 1- Personal Database 2- Workgroup Database 3- Department Database 4- Enterprise Database


What is active database and cloud database?

The database we use in our daily life is called as active database . The data that is stored in the database which is further stored on the cloud is called cloud database.


What is Tagalog of vulnerable?

Tagalog Translation of VULNERABLE: mahina