Which attack method if it vulnerable?

If a web server accepts input from the user and passes it to a bash shell, to which attack method if it vulnerable?
A. input validation
B. hash collision
C. command injection
D. integer overflow

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.