One of the most consistently reported software security vulnerabilities that leads to major exploits
is:

A.
Lack of malware detection.
B.
Attack surface decrease.
C.
Inadequate network hardening.
D.
Poor input validation.
Explanation:
D: With coding there are standards that should be observed. Of these standards the most
fundamental is input validation. Attacks such as SQL injection depend on unfiltered input being
sent through a web application. This makes for a software vulnerability that can be exploited.
There are two primary ways to do input validation: client-side validation and server-side validation.
Thus with poor input validation you increase your risk with regard to exposure to major software
exploits.