request with malicious input. • Server stores the script in the database. • When victim visits the page, script loads. • BOOM! XSS • Client sends a request with malicious input to the server. • Server sends back the user input without validation. • Browser executes the malicious code. • BOOM! XSS DOM Based XSS is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs in an “unexpected” manner. REFLECTED XSS STORED XSS DOM-BASED XSS