You are on page 1of 3

XSS Attacks:

Reflected
XSS Attacks:
Stored
Key Points:

- None

You might also like