Answer:
Attackers can leverage exposed API parameters for injection attacks by injecting malicious code or data to manipulate API behavior and retrieve sensitive information.
Attackers can leverage exposed API parameters for injection attacks by injecting malicious code or data to manipulate API behavior and retrieve sensitive information.
You may be interested in:
Web Security MCQs