Answer:
Attackers can exploit inadequate input validation at the architecture level by exploiting the lack of proper validation, allowing the injection of malicious scripts into user inputs and facilitating XSS attacks.
Attackers can exploit inadequate input validation at the architecture level by exploiting the lack of proper validation, allowing the injection of malicious scripts into user inputs and facilitating XSS attacks.
You may be interested in:
Web Security MCQs