Posted by: Pdfprep
Post Date: December 1, 2020
The target web application server is running as the root user and is vulnerable to command injection.
Which result of a successful attack is true?
A . cross-site scripting
B . cross-site request forgery
C . privilege escalation
D . buffer overflow
Answer: B
Leave a Reply