A security administrator notices that the log file of the company`s webserver contains suspicious
entries:
Based on source code analysis, the analyst concludes that the login.php script is vulnerable to
A.
command injection.
B.
SQL injection.
C.
directory traversal.
D.
LDAP injection.
B