OS command injection
What is a common consequence of OS command injection?
Which character is often used to chain commands in OS command injection?
How can input validation help prevent OS command injection?
Which of the following is a secure alternative to executing system commands in an application?
Which of the following is a real-world example of an OS command injection attack?
Which of these techniques helps detect OS command injection vulnerabilities in a web application?