Which of the following attacks takes advantage of user provided input to inject executable binary code into a running program?
A.
SQL injection
B.
Session hijacking
C.
Heder manipulation
D.
Buffer overflow
Which of the following attacks takes advantage of user provided input to inject executable binary code into a running program?
Which of the following attacks takes advantage of user provided input to inject executable binary code into a running program?
A.
SQL injection
B.
Session hijacking
C.
Heder manipulation
D.
Buffer overflow