1 line
180 B
Plaintext
1 line
180 B
Plaintext
The following code is vulnerable to log injection as it constructs log entries using untrusted data. An attacker can leverage this to manipulate the chain of events being recorded. |