| ________ is exploited by influencing SQL statements that do not filter input from applications to a backend database correctly.
Choose the correct option from below list
(1)DoS Attacks
(2)Privilege issues
(3)Data leaks
(4)SQL Injection
Answer:-(4)SQL Injection | | |