[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This document provides reference information for the `AttackVector` enum within the Google Cloud Web Security Scanner v1 API, detailing various types of cross-site scripting (XSS) attack vectors."],["The `AttackVector` enum includes fields such as `Cookie`, `FormInput`, `GetParameters`, `PostParameters`, `StoredXss`, and others, each representing a different source or method of an XSS attack."],["The `Google.Cloud.WebSecurityScanner.V1` namespace and `Google.Cloud.WebSecurityScanner.V1.dll` assembly are specified as the context for this enum's implementation."],["The latest version of this specific documentation is 2.5.0, and previous versions are also accessible, with versions ranging from 1.0.0 to 2.4.0."],["The fields provided under `AttackVector` allow users to determine if the fuzzing comes from the browser's cookies, a certain input element, or whether it comes from the server side or elsewhere."]]],[]]