You are attacking an application that holds no sensitive data and contains no authentication or access control mechanisms. In this situation, how should you rank the signifi cance of the following vulnerabilities?
(a) SQL injection
(b) XPath injection
(c) OS command injection
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here