Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Applications that must accept file uploads must ensure that an adversary cannot upload or transfer malicious files. If a restricted file containing code is executed by the target system, it can result in misuse of privileges.

 Placeholder