Service A's logic has been implemented using managed code. An attacker sends an XML bomb to Service A . As a result, Service A's memory consumption started increasing at an alarming rate and then decreased back to normal. The service was not affected by this attack and quickly recovered. Which of the following attacks were potentially avoided?
Thomasena
4 months agoReita
4 months agoPaulina
4 months agoMica
4 months agoRikki
5 months agoFarrah
5 months agoReyes
5 months agoMicaela
5 months agoKenia
5 months agoRemedios
5 months ago