Allows an attacker to execute scripts in the victim's web browser. This
attack is used to intercept user sessions, deface websites, insert hostile content, conduct phishing
attacks, and take over the user's browser by using scripting malware. All web application frameworks are vulnerable to this exploit.
read more >>