Answer:
Attackers can exploit a business logic flaw related to authentication by manipulating the underlying business logic to bypass authentication mechanisms, gaining unauthorized access.
Attackers can exploit a business logic flaw related to authentication by manipulating the underlying business logic to bypass authentication mechanisms, gaining unauthorized access.
You may be interested in:
Web Security MCQs