During the analysis of malicious code, a security analyst discovers JavaScript being used to send random data to another service on the same system. This is MOST likely an example of which of the following?
A.
Buffer overflow
B.
XML injection
C.
SQL injection
D.
Distributed denial of service