Answer:
Attackers can exploit file inclusion vulnerabilities by manipulating input parameters to include arbitrary files, including potentially malicious ones.
Attackers can exploit file inclusion vulnerabilities by manipulating input parameters to include arbitrary files, including potentially malicious ones.
You may be interested in:
Web Security MCQs - PART 2