Q. In which of the following exploits does an attacker insert malicious coding into a link that appears to be from a trustworthy source? (Solved)
1. Cross-site scripting
2. Command injection
3. Path traversal attack
4. Buffer overflow
- a. Cross-site scripting