Practice Test Geeks home

CCT - Certified Cybersecurity Technician CCT CCT Application Security & Secure Coding

Which OWASP Top 10 vulnerability occurs when untrusted data is sent to an interpreter as part of a command or query?

Select your answer