A server administrator notes that a fully patched application often stops running due to a memory error. When
reviewing the debugging logs, they notice code being run calling an internal process to exploit the machine.
Which of the following attacks does this describes?
Cross site scripting