Watch this video on YouTube
A cybersecurity expert is testing the security of a mobile application by inputting unexpected values. What vulnerability is likely being tested?