sidebar interaction. Press tab to begin.

In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system? 

1. Buffer overflow

2. SQL injection
3. Cross-site scripting
4. Man-in-the-middle attack