Q. In which of the following exploits does an attacker add SQL code to a Web form inputbox to gain access to resources or make changes to data? (Solved)
1. Cross-site scripting
2. Command injection
3. SQL injection
4. Buffer overflow
- c. SQL injection