___________ can be exploited to completely ignore authorization constraints.

DWQA QuestionsCategory: Cyber Security___________ can be exploited to completely ignore authorization constraints.
Editor Staff asked 1 month ago

___________ can be exploited to completely ignore authorization constraints.
(1)Cross site Scripting
(2)Race conditions
(3)OS command injection
(4)SQL Injection

1 Answers
Editor Staff answered 1 month ago

Correct answer:-(3)OS command injection