An application developer has neglected to include input validation checks in the design of the company’s new web application. An employee discovers that repeatedly submitting large amounts of data, including custom code, to an application will allow the execution of the custom code at the administrator level.
Which of the following BEST identifies this application attack?
A . Cross-site scripting
B . Clickjacking
C . Buffer overflow
D . Replay