Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?
A. Injection
B. Missing function-level access control
C. Cross-site request forgery
D. Cross-site scripting
A. Injection
B. Missing function-level access control
C. Cross-site request forgery
D. Cross-site scripting