A web application uses user input in its search functionality without proper sanitization. Identify the type of XSS vulnerability.
- Blind XSS
- DOM-based XSS
- Reflected XSS
- Stored XSS
In a scenario where user input is stored without proper sanitization, it can lead to Stored XSS vulnerability. This occurs when the malicious script is permanently stored on the target server and served to users who access the affected page.
Loading...
Related Quiz
- What is the primary purpose of a filter chain in a servlet environment?
- When designing a servlet that handles sensitive data, which header should be set to secure the response?
- When refactoring a servlet to make it more configurable, what changes are made regarding initialization parameters?
- A web application needs to redirect the user to different pages based on their role. How should this logic be implemented using servlets in MVC?
- How can you track attribute changes in the HttpSession object?