Answer:
Attackers can manipulate input parameters to change the behavior of business processes and exploit business logic flaws.
Attackers can manipulate input parameters to change the behavior of business processes and exploit business logic flaws.
You may be interested in:
Web Security MCQs - PART 2