Answer:
Attackers can exploit RCE vulnerabilities to manipulate the server and execute commands with elevated privileges, leading to privilege escalation.
Attackers can exploit RCE vulnerabilities to manipulate the server and execute commands with elevated privileges, leading to privilege escalation.
You may be interested in:
Web Security MCQs - PART 2