Thursday, March 6, 2025

XSS Comparison Table
Feature Reflected XSS DOM-Based XSS
Execution Context Server-side response includes malicious content Client-side JavaScript executes malicious payload
Attack Mechanism Injected script travels from web request to response JavaScript modifies the DOM dynamically
Entry Point URL query strings, form inputs, HTTP headers DOM properties (e.g., document.URL, location.href)
Requires Server Interaction Yes No
Common Example Malicious link shared via email or social media JavaScript manipulating DOM elements on the client side

No comments: