Without validating user input, an application becomes vulnerable to all of the following EXCEPT: seenagape 9 years ago Without validating user input, an application becomes vulnerable to all of the following EXCEPT: A.Buffer overflow. B.Command injection. C.Spear phishing. D.SQL injection. ← Previous question Next question →