An application code that performs authentication on the client-side is exploited by an intruder with reverse engineering skills. Which of the following vulnerability has been exploited by the intruder here?
1) Buffer Overflow
2) Cross-Site Scripting (XSS)
3) SQL Injection
4) Reverse Engineering