An attacker exploited a vulnerability on a mail server using the code below.
Which of the following BEST explains what the attacker is doing?
A. The attacker is replacing a cookie.
B. The attacker is stealing a document.
C. The attacker is replacing a document.
D. The attacker is deleting a cookie.