A forensics investigator is examining a number of unauthorized payments that were reported on the company's websitE. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribE. One of the users reported the email to the phishing team, and the forwarded email revealed the link to be:
A. SQL injection
B. Broken Authentication
C. XSS
D. XSRF