Answer:
Attackers exploit input fields to launch injection attacks by injecting specially crafted input containing malicious commands, manipulating the normal behavior of the application.
Attackers exploit input fields to launch injection attacks by injecting specially crafted input containing malicious commands, manipulating the normal behavior of the application.
You may be interested in:
Web Security MCQs