A penetration tester reviews the scan results of a web application. Which of the following vulnera-bilities is MOST critical and should be prioritized for exploitation?
A. Stored XSS
B. Fill path disclosure
C. Expired certificate
D. Clickjacking
References https://www.owasp.org/index.php/Top_10_2010-A2-Cross-Site_Scripting_(XSS)