Which of the following application attacks is used to gain access to SEH?
A.
Cookie stealing
B.
Buffer overflow
C.
Directory traversal
D.
XML injection
Which of the following application attacks is used to gain access to SEH?
Which of the following application attacks is used to gain access to SEH?
A.
Cookie stealing
B.
Buffer overflow
C.
Directory traversal
D.
XML injection