a video-game developer as received reports of players who arecheating. all game players each have five capabilities that areranked on a scale of 1 to 10 points, with 10 total points availablefor balance. players can move these points between capabilities atany time. the programming logic is as follows:
o a player asks to move points from one capability toanother.
o the source capability must have enough points to allow themove.
o the destination capability must not exceed 10 after themove.
o the move from source capability to destination capability isthen completed.
the time stamps of the game logs show each step of the transferprocess takes about 900ms. however, the time stamps of the cheatingplayers show capability transfers at the exact same time. thecheating players have 10 points in multiple capabilities. which ofthe following is MOST likely being exploited to allow thesecapability transfers?
A. TOC/TOU
B. CSRF
C. Memory leak
D. XSS.
E. SQL injection
F. Integer overflow