You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Applications that must accept file uploads must ensure that an adversary cannot upload or transfer malicious files. If a restricted file containing code is executed by the target system, it can result in misuse of privileges.

 

  • No labels