While reviewing a database server log, you notice several qu…
While reviewing a database server log, you notice several queries that successfully returned the contents of the table named ‘TBL_employees’. Authorized users perform this query on a regular basis, however, the queries in question are using a malformed query string that includes “1=1”. Which of the following vulnerabilities were exploited