ccsp video for what type of common vulnerability can occur when an application accepts objects from untrusted sources via APIs and can result in the
What type of common vulnerability can occur when an application accepts objects from untrusted sources via APIs and can result in the modification of application logic?