A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.
Which of the following actions would BEST resolve the issue? (Choose two.)
am2005
Highly Voted 3 years, 2 months agoRevZig67
Highly Voted 2 years, 11 months agoblacksheep6r
Most Recent 2 months, 4 weeks agoProCoder101
3 months, 1 week agoBHWAZN
7 months, 1 week agofb2fcb1
7 months, 1 week agofb2fcb1
7 months, 1 week ago23169fd
7 months, 1 week agoDelab202
7 months, 1 week agotineboy46
1 year, 2 months agorvv1978
1 year, 10 months agoCASP_Master
1 year, 11 months agouser009
2 years, 1 month agoryanzou
2 years, 6 months agojaelee
2 years, 6 months agoccryptix
2 years, 7 months agodangerelchulo
2 years, 8 months ago