Answer:
Inadequate input validation can lead to command injection vulnerabilities by allowing attackers to inject and execute arbitrary commands on the server.
Inadequate input validation can lead to command injection vulnerabilities by allowing attackers to inject and execute arbitrary commands on the server.
You may be interested in:
Web Security MCQs