Which of the following software vulnerabilities could lead to a buffer overflow attack?
Unbounded array
SQL injection
Unencrypted data storage
Improper input validation

Ethics in Computing Exercises are loading ...