Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?