A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the victim's browser
-
Updated
Jan 29, 2024
A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the victim's browser
Reflected parameters checker for a list of urls. (Beta version needing a lot of improvement)
Add a description, image, and links to the reflected topic page so that developers can more easily learn about it.
To associate your repository with the reflected topic, visit your repo's landing page and select "manage topics."