List of questions
Related questions
Question 22 - ECSS discussion
Melanie, a professional hacker, is attempting to break into a target network through an application server. In this process, she identified a logic flaw in the target web application that provided visibility into the source code. She exploited this vulnerability to launch further attacks on the target web application.
Which of the web application vulnerabilities was identified by Melanie in the above scenario?
A.
Insecure deserialization
B.
Security misconfiguration
C.
Command injection
D.
Broken authentication
Your answer:
0 comments
Sorted by
Leave a comment first