wrae3513 wrae3513 12-09-2022 Computers and Technology contestada What is it known as when an attacker manipulates the database code to take advantage of a weakness in it?