Answer:
Attackers can exploit flaws in API versioning by manipulating the server to exploit vulnerabilities in older API versions for malicious purposes.
Attackers can exploit flaws in API versioning by manipulating the server to exploit vulnerabilities in older API versions for malicious purposes.
You may be interested in:
Web Security MCQs - PART 2