In which of the following exploits does an attacker insert malicious code into a link that appears to be from a trustworthy source?
Cross-Site Scripting
Buffer over flows
Command injection
Path traversal attack