Which vulnerability type is described as enabling attacker-executed scripts within a user's browser?

Study for the PCI Data Security Standard Exam. Master your knowledge with interactive flashcards and multiple-choice questions, each with hints and explanations. Prepare confidently for your certification test!

Multiple Choice

Which vulnerability type is described as enabling attacker-executed scripts within a user's browser?

Explanation:
Cross-site scripting is when attacker-supplied scripts are run by the victim’s browser in the context of the trusted site. The browser treats the injected code as if it came from the site itself, so it can access the user’s data (like cookies or tokens), read or modify page content, or perform actions on behalf of the user. This happens when an application takes input from users and includes it in a web page without proper sanitization or encoding, or when data from the user is dynamically added to the DOM. Buffer overflow involves overflowing memory to change what code runs, usually at the system level. SQL injection targets database queries to manipulate data. CSRF tricks a user into submitting a request while authenticated, without necessarily running scripts in the user’s browser. Since the described scenario centers on attacker-executed scripts inside the user’s browser, the correct vulnerability is cross-site scripting.

Cross-site scripting is when attacker-supplied scripts are run by the victim’s browser in the context of the trusted site. The browser treats the injected code as if it came from the site itself, so it can access the user’s data (like cookies or tokens), read or modify page content, or perform actions on behalf of the user. This happens when an application takes input from users and includes it in a web page without proper sanitization or encoding, or when data from the user is dynamically added to the DOM.

Buffer overflow involves overflowing memory to change what code runs, usually at the system level. SQL injection targets database queries to manipulate data. CSRF tricks a user into submitting a request while authenticated, without necessarily running scripts in the user’s browser. Since the described scenario centers on attacker-executed scripts inside the user’s browser, the correct vulnerability is cross-site scripting.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy