SQL Injection attacks take advantage of poorly coded applications by submitting hidden code “injected” into a seemingly harmless piece of code. The solution is to make sure input fields from an ...