Code injection is the general name for many types of attacks that involve introducing malicious code into applications. For example, attackers may send code as values of form fields or add argument values in uniform resource identifiers (URIs). These attacks exploit lack of accurate input/output data validation.
Code injection vulnerabilities belong to the A1 category in the OWASP 2010 Top Ten Security Risks.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center