Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. user input validation in a web page or web application
B. Linux and Windows operating systems
C. database
D. web page images
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. user input validation in a web page or web application
B. Linux and Windows operating systems
C. database
D. web page images
the answer should be A
It could also be A. Actually, A makes much more sense than C, as it is not a flaw in the database mechanism. SQL injection happens due to unsanitized/unescaped inputs on the web page.