Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions?

Which of the following vulnerabilities occurs when an application directly uses or concatenates
potentially hostile input with data file or stream functions?

Which of the following vulnerabilities occurs when an application directly uses or concatenates
potentially hostile input with data file or stream functions?

A.
Insecure cryptographic storage

B.
Malicious file execution

C.
Insecure communication

D.
Injection flaw

Explanation:
Malicious file execution is a vulnerability that occurs when an application directly
uses or concatenates potentially hostile input with data file or stream functions. This leads to
arbitrary remote and hostile data being included, processed, and invoked by the Web server.
Malicious file execution can be prevented by using an indirect object reference map, input
incorrect. Insecure communication occurs when applications have failed to encrypt network traffic.



Leave a Reply 0

Your email address will not be published. Required fields are marked *