A security analyst reviews web server logs and notices the following line:
Which of the following vulnerabilities is the attacker trying to exploit?
A. SSRF
B. CSRF
C. XSS
D. SQLi
Which of the following vulnerabilities is the attacker trying to exploit?
A. SSRF
B. CSRF
C. XSS
D. SQLi