During his secure code review, John, an independent application security expert, found that the developer has used Java code as highlighted in the following screenshot. Identify the security mistake committed by the developer?
Limited Time Offer
25%
Off
Gearldine
20 hours agoPamella
7 days agoTerrilyn
8 days ago