During a review of the logs, a cybersecurity analyst notices that the data inputs recorded for a machine learning model used in fraud detection exhibit an unusual pattern that significantly deviates from the expected data format and ranges. The anomaly led to a drop in detection accuracy, and subsequent investigations pointed to external manipulation. What type of vulnerability is most likely being exploited in this scenario?
SQL injection
Parameter tampering
Cross-site request forgery
Buffer overflow
Heap overflow
Data poisoning