"Attacker sends text- based attack data that exploit the interpreter in the browser". This is the example of :
Injection
Cross Site Request Forgery
Cross Site Scripting
Failure to Restrict URL Access