Question 149:
Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions?
Answer options:
A. Insecure cryptographic storage B. Malicious file execution C. Insecure communication D. Injection flaw