Answer:
A command injection attack occurs by injecting malicious commands into user inputs that are passed to system commands on the server.
A command injection attack occurs by injecting malicious commands into user inputs that are passed to system commands on the server.
You may be interested in:
Web Security MCQs - PART 2