A security analyst reviews web server logs and notices the following line:

Which of the following vulnerabilities is the attacker trying to exploit?
A. SSRF
B. CSRF
C. XSS
D. SQLi

Which of the following vulnerabilities is the attacker trying to exploit?
A. SSRF
B. CSRF
C. XSS
D. SQLi