Without validating user input, an application becomes vulnerable to all of the following EXCEPT:
A.
Buffer overflow.
B.
Command injection.
C.
Spear phishing.
D.
SQL injection.
Without validating user input, an application becomes vulnerable to all of the following EXCEPT:
Without validating user input, an application becomes vulnerable to all of the following EXCEPT:
A.
Buffer overflow.
B.
Command injection.
C.
Spear phishing.
D.
SQL injection.