A hacker tries to compromise your system by submitting script into a field in a web application that is then stored as data in the web site database. The hacker is anticipating when you navigate to the site that your browser will parse the script and execute it. What type of attack is this?
A. Buffer overflow
B. SQL injection
C. Folder traversal
D. Cross-site scripting