Answer:
Attackers can exploit a business logic flaw related to privilege escalation by manipulating the underlying business logic to gain unauthorized privileges or access levels.
Attackers can exploit a business logic flaw related to privilege escalation by manipulating the underlying business logic to gain unauthorized privileges or access levels.
You may be interested in:
Web Security MCQs