Which of the following is a vulnerability that can lead to SQL injection attacks?
Lack of input validation
Weak encryption algorithms
Insufficient access control
Unencrypted data storage

Distributed Systems Exercises are loading ...