Answer:
Attackers can exploit weak session validation by manipulating it to gain unauthorized access or perform actions within the application logic.
Attackers can exploit weak session validation by manipulating it to gain unauthorized access or perform actions within the application logic.
You may be interested in:
Web Security MCQs - PART 2