#vulnerability
Read more stories on Hashnode
Articles with this tag
By Prabhudarshan Samal This article is about a well-illustrated write-up based on hacking activities in an educational temperament and non-abusive...
Applications of cross-site scripting:- An attacker that uses a cross-site scripting flaw can usually do the following: Assume the identity of the...