_______ vulnerability arises when an application includes untrusted data in a new web page without proper validation.

  • Clickjacking
  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • SQL Injection
Cross-Site Scripting (XSS) vulnerability occurs when untrusted data is included in a web page without proper validation, allowing malicious scripts to be executed.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *