Which statement is a characteristic of the broken access control threat to web applications?
Which statement is a characteristic of the broken access control threat to web applications? It allows attackers to access, and potentially change, serialized versions of data and objects. It allows…