Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

A security administrator notices that the log file of the company`s webserver contains suspicious
entries:

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

A security administrator notices that the log file of the company`s webserver contains suspicious
entries:

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

A.
command injection.

B.
SQL injection.

C.
directory traversal.

D.
LDAP injection.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ghost Man

Ghost Man

B is the Ans.