Answer:
An attacker can exploit insufficient input validation in API requests by executing malicious code through API endpoints.
An attacker can exploit insufficient input validation in API requests by executing malicious code through API endpoints.
You may be interested in:
Web Security MCQs