During a routine vulnerability assessment, the following command was successful: echo "vrfy 'perl -e 'print "hi" x 500 ' ' " | nc www.company.com 25Which of the following vulnerabilities is being exploited?
A. Buffer overflow directed at a specific host MTA
B. SQL injection directed at a web server
C. Cross-site scripting directed at www.company.com
D. Race condition in a UNIX shell script
Answer: A. Buffer overflow directed at a specific host MTA
Computer Science & Information Technology
You might also like to view...
Which of the following objects cannot trap mouse events?
a. JTextField. b. ButtonGroup. c. JButton. d. JComponent.
Computer Science & Information Technology
To format the slide master background, click the Background Styles button to display the Background Styles gallery.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology