A security administrator notices that the log file of the company`s webserver contains suspicious entries:

A security administrator notices that the log file of the company`s webserver contains suspicious entries:

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

A security administrator notices that the log file of the company`s webserver contains suspicious entries:

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

A.
command injection.

B.
SQL injection.

C.
directory traversal.

D.
LDAP injection.



Leave a Reply 0

Your email address will not be published. Required fields are marked *