Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
Unvalidated redirects and forwards occur when an application does not properly validate user input before redirecting or forwarding requests. Attackers exploit this weakness to redirect users to malicious sites that appear legitimate, leading to phishing attacks, malware downloads, or credential theft.
When an application doesn't validate input properly, it may inadvertently allow attackers to craft URLs that redirect users to malicious sites. This is known as unvalidated redirects and forwards, and it poses a significant risk because users might be tricked into believing they're navigating within a legitimate environment.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
SCha81
3 weeks, 3 days agoMaciekMT
1 month, 1 week agoakg001
4 months, 2 weeks ago