You have a website that accepts input from users for creatin…

You have a website that accepts input from users for creating customer accounts. Input on the form is passed to a database server where the user account information is stored.   An attacker is able to insert database commands in the input fields and have those commands execute on the server.   Which type of attack has occurred?