Figure 11
Figure 11: Some juicy information resulting from the XSS attack.
Figure 11: Some juicy information resulting from the XSS attack.