Answer:
Attackers might exploit a lack of server-side validation for file uploads by uploading malicious files or bypassing restrictions, potentially leading to unauthorized access or execution of arbitrary code.
Attackers might exploit a lack of server-side validation for file uploads by uploading malicious files or bypassing restrictions, potentially leading to unauthorized access or execution of arbitrary code.
You may be interested in:
Web Security MCQs