Question: Which attack exploits input validation vulnerabilities?

  1. ARP spoofing
  2. pharming attacks
  3. cross-site scripting (XSS)
  4. DNS poisoning

Answer: The correct answer of the above question is Option C:cross-site scripting (XSS)