While reading an IT-related website, a tech notices an anonymous user's post about a vulnerability in a popular freeware. This vulnerability allows a remote user to gain access to the system via the freeware and match the level of permissions the app has. What type of attack is the user's post alluding to?
a.Command injection attack
b. Injection attack
c. Forgery attack
d. Application attack