A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization.
Which of the following actions would BEST resolve the issue? (Choose two.)
am2005
Highly Voted 3 years, 4 months agoRevZig67
Highly Voted 3 years, 1 month agoperti95
Most Recent 2 weeks, 2 days agoBluedegard2_111
3 weeks agoblacksheep6r
4 months, 2 weeks agoProCoder101
5 months agoBHWAZN
9 months agofb2fcb1
9 months agofb2fcb1
9 months ago23169fd
9 months agoDelab202
9 months agotineboy46
1 year, 4 months agorvv1978
1 year, 12 months agoCASP_Master
2 years, 1 month agouser009
2 years, 2 months agoryanzou
2 years, 7 months agojaelee
2 years, 8 months ago