XSS
Stealing user cookies for account takeover is much better than popping an alert box.
There are three types of XSS vulnerabilities reflected, stored, and DOM.
Reflected
Input Field
Event Attributes
Stored
What distinguishes stored XSS from reflected XSS?
Popular places to store user input:
DOM Based
What distinguishes DOM-based from stored XSS and reflected XSS?
illustration

Sources
Sinks
A list of dangerous sinks
Sink
Example
Polyglot
Cookie Stealer
Exploitation

Last updated