shelseamorrrow7765 shelseamorrrow7765 25-01-2024 Computers and Technology contestada Which exploit takes advantage of a web-page field that does not validate input? 1) Session hijacking 2) Command injection 3) Password cracking 4) Steganography