What is the term for the unauthorized modification of data within a database by exploiting vulnerabilities in an application's software?

Question 1 Report

What is the term for the unauthorized modification of data within a database by exploiting vulnerabilities in an application's software?