List of questions
Related questions
Question 448 - 312-50v12 discussion
Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?
] >
A.
XXE
B.
SQLi
C.
IDOR
D.
XXS
Your answer:
0 comments
Sorted by
Leave a comment first