Which sequence best describes a realistic, severe combined vulnerability that often results in widespread data exposure?
IDOR present on a cached endpoint + cache poisoning ability to store attacker content under victim cache keys
Path traversal → file upload vulnerability → Cross-site scripting
Weak password policy → public Git repo → telemetry leak
Missing CSP header → mixed content → slow page loads
This question is part of this quiz :
Cyber Quiz Day 34