Answer:
Attackers can exploit file upload vulnerabilities by uploading files containing malicious executable code, leading to potential compromise.
Attackers can exploit file upload vulnerabilities by uploading files containing malicious executable code, leading to potential compromise.
You may be interested in:
Web Security MCQs