ethical-hacker video for as the Information Security Manager at HDA Inc., you discovered that the browser of one of your employees sent malicious requests
As the Information Security Manager at HDA Inc., you discovered that the browser of one of your employees sent malicious requests without the employee's knowledge. Upon further investigation, you determine that the attack exploited a vulnerability on a specific web page. What type of web page vulnerability did the attacker use?