__________ attacks are vulnerabilities involving the inclusion of script code in the HTML content of a Web page displayed by a user's browser
A. PHP file inclusion B. Mail injection
C. Code injection D. Cross-site scripting
D
Business
A. PHP file inclusion B. Mail injection
C. Code injection D. Cross-site scripting
D