Which attack exploits input validation vulnerabilities?
pharming attacks
ARP spoofing
cross-site scripting (XSS)
DNS poisoning White Hat Sec