For example, the following code is normally vulnerable to an XSS attack because it takes user-supplied input and outputs it directly back to the user, ...
確定! 回上一頁