Answer:
An attacker exploits a server-side injection vulnerability by injecting malicious code or commands into user inputs to manipulate data on the server.
An attacker exploits a server-side injection vulnerability by injecting malicious code or commands into user inputs to manipulate data on the server.
You may be interested in:
Web Security MCQs - PART 2