Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting user-s
browser to send malicious requests they did not intend?
A. Command Injection Attacks
B. File Injection Attack
C. Cross-Site Request Forgery (CSRF)
D. Hidden Field Manipulation Attack