An application code that performs authentication on the client-side is exploited by an intruder with reverse engineering skills. Which of the following vulnerability has been exploited by the intruder here? 1) Buffer Overflow 2) Cross-Site Scripting (XSS) 3) SQL Injection 4) Reverse Engineering