An undocumented command sequence is allowing unauthorized access to a software system.
What type of software defect allows this vulnerability?
A) Input validation issue
B) Race condition
C) Backdoor
D) Buffer overflow





Q&A Education