About 4,880,000 results
Open links in new tab
  1. NoSQL injection | Web Security Academy - PortSwigger

    Operator injection - This occurs when you can use NoSQL query operators to manipulate queries. In this topic, we'll look at how to test for NoSQL vulnerabilities in general, then focus on exploiting …

  2. What Is NoSQL Injection? | MongoDB Attack Examples | Imperva

    Oct 28, 2025 · NoSQL injection occurs when a query, most commonly delivered by an end-user, is not sanitized, allowing the attacker to include malicious input that executes an unwanted command on …

  3. NoSQL injection - HackTricks

    This is analogous to SQL injection attacks where inputs like ' or 1=1-- - are used to manipulate SQL queries. In MongoDB, similar injections can be done using inputs like ' || 1==1//, ' || 1==1%00, or …

  4. NoSQL Injection Explained: What It Is and How to Prevent It

    Sep 3, 2025 · What Is NoSQL Injection? NoSQL injection happens when untrusted input is inserted into a NoSQL query, changing its logic. It is similar in spirit to classic SQL injection, but targets document, …

  5. What is NoSQL Injection? Exploitations and Security Tips

    Mar 25, 2025 · A NoSQL injection is an attack that targets NoSQL databases by exploiting vulnerabilities in the way queries are formulated. The aim is for an attacker to manipulate these insecure queries to …

  6. What Is NoSQL Injection? Examples, Prevention, and More

    Jan 2, 2025 · NoSQL Injection is a type of injection attack that exploits vulnerabilities in NoSQL databases by injecting malicious code into a query. This technique can allow attackers to bypass …

  7. NoSQL injection - Invicti

    NoSQL injection is a vulnerability that lets a malicious hacker introduce (inject) undesired code into database queries executed by NoSQL databases such as MongoDB, Cassandra, Neo4j, Redis, and …

  8. NoSQL injection attack | Tutorials & examples | Snyk Learn

    Learn how NoSQL Injection attacks work, and compare them to the similar SQL injection attacks with examples and remediation information.

  9. NoSQL Injection: Understanding the Threat and How to Defend …

    Jul 3, 2025 · They power everything from social media platforms and real-time analytics to IoT devices and modern web applications. But with this shift comes a new set of security challenges. One of the …

  10. NoSQL Injection - SecureFlag Security Knowledge Base

    The NoSQL Injection is a security vulnerability that, much like a SQL Injection vulnerability, relies on weaknesses exposed by insufficient input validation, allowing an attacker to view or change backend …