Any user-controlled parameter that gets processed by the application includes vulnerabilities like ___________
(a) Host-related information
(b) Browser-related information
(c) Application parameters included as part of the body of a POST request
(d) All of the mentioned
I have been asked this question in an interview.
Question is from SQL Injection in division Developing with SQL Server of SQL Server