Consider the following Python code snippet: This code aims…
Consider the following Python code snippet: This code aims to read a file specified by the user. Which of the following options correctly identifies potential security flaws in this code related to CWE-35: Path Traversal? Tip: Look for information about the CWE-35 at https://cwe.mitre.org/, trying to recognize what it is and its main characteristics, how to mitigate it, etc.
Read Details