A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.
Which of the following actions would BEST resolve the issue? (Choose two.)
am2005
Highly Voted 3 years, 2 months agoRevZig67
Highly Voted 2 years, 11 months agoblacksheep6r
Most Recent 2 months, 3 weeks agoProCoder101
3 months agoBHWAZN
7 months agofb2fcb1
7 months agofb2fcb1
7 months ago23169fd
7 months agoDelab202
7 months agotineboy46
1 year, 2 months agorvv1978
1 year, 10 months agoCASP_Master
1 year, 11 months agouser009
2 years agoryanzou
2 years, 5 months agojaelee
2 years, 6 months agoccryptix
2 years, 6 months agodangerelchulo
2 years, 7 months ago