In the course of an investigation, you discover that the browser of one of your team members unintentionally sent malicious requests without their knowledge. Identify the web page vulnerability that the attacker exploited in targeting your team member.