What is the first step in a XSS attack?
Injection of malicious code to a web form
The use of vulnerable APIs
The use of vulnerable web app components
Web browser triggers a URL
Shubham Haldkar Changed status to publish 27, September ,2022
Injection of malicious code to a web form
Shubham Haldkar Changed status to publish 27, September ,2022