Which type of vulnerabilities can result from a server accepting untrusted, unvalidated input?
A. redirection
B. spoofing
C. injection
D. insertion
Answer: C
Computer Science & Information Technology
A. redirection
B. spoofing
C. injection
D. insertion
Answer: C