___________ can be exploited to completely ignore authorization constraints.
(1)Cross site Scripting
(2)Race conditions
(3)OS command injection
(4)SQL Injection