Answer:
An attacker can exploit a file upload vulnerability by uploading malicious files containing executable code, which can compromise the security of the server.
An attacker can exploit a file upload vulnerability by uploading malicious files containing executable code, which can compromise the security of the server.
You may be interested in:
Web Security MCQs