a. Poor handling of unexpected input can lead to the execution of arbitrary instructions |
b. Unintentional or ill-directed use of superficially supplied input |
c. Cryptographic flaws in the system may get exploited to evade privacy |
d. Weak or non-existent authentication mechanisms |
Answer: Weak or non-existent authentication mechanisms |