An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?
A.
Integer overflow
B.
Cross-site scripting
C.
Zero-day
D.
Session hijacking
E.
XML injection