sidebar interaction. Press tab to begin.

In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system? 

1 answer

1. Buffer overflow
2. SQL injection
3. Cross-site scripting
4. Man-in-the-middle attack