A security administrator notices that the log file of the company’s webserver contains suspicious entries:
Based on source code analysis, the analyst concludes that the login.php script is vulnerable to
A.
command injection.
B.
SQL injection.
C.
directory traversal.
D.
LDAP injection.