1. You discover that the contents of a cookie parameter are copied without any fi lters or sanitization into the application’s response. Can this behavior be used to inject arbitrary JavaScript int Name three possible attack payloads for XSS exploits (that is, the malicious actions that you can perform within another user’s browser, not the methods by which you deliver the attacks)
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here