A security administrator notices that the log file of the company`s webserver contains suspicious entries:
Based on source code analysis, the analyst concludes that the login.php script is vulnerable to
command injection.
SQL injection.
directory traversal.
LDAP injection.
Submit