Answer:
input validation vulnerability
Step-by-step explanation:
usually crafted through a URL and sent to a victim and they open it unknowingly
3.5m questions
4.5m answers