Which of the following type of attack uses HTML tags to identify a possible vulnerability?

a. XSS Scripting
b. Privilege escalation
c. Overflow attack
d. Directory transversal
e. SQL Injection