Today’s 220-1202 CompTIA A+ Pop Quiz: Hunting and pecking

A security researcher has gained access to a database using a vulnerability in a web-based application. Which of the following would best describe this vulnerability?