[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-28 UTC."],[],[],null,["# Google Cloud Web Security Scanner V1 Client - Class AttackVector (1.0.5)\n\nVersion latestkeyboard_arrow_down\n\n- [1.0.5 (latest)](/php/docs/reference/cloud-web-security-scanner/latest/V1.Xss.AttackVector)\n- [1.0.4](/php/docs/reference/cloud-web-security-scanner/1.0.4/V1.Xss.AttackVector)\n- [0.8.5](/php/docs/reference/cloud-web-security-scanner/0.8.5/V1.Xss.AttackVector)\n- [0.7.18](/php/docs/reference/cloud-web-security-scanner/0.7.18/V1.Xss.AttackVector) \nReference documentation and code samples for the Google Cloud Web Security Scanner V1 Client class AttackVector.\n\nTypes of XSS attack vector.\n\nProtobuf type `google.cloud.websecurityscanner.v1.Xss.AttackVector`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ WebSecurityScanner \\\\ V1 \\\\ Xss\n\nMethods\n-------\n\n### static::name\n\n### static::value\n\nConstants\n---------\n\n### ATTACK_VECTOR_UNSPECIFIED\n\n Value: 0\n\nUnknown attack vector.\n\nGenerated from protobuf enum `ATTACK_VECTOR_UNSPECIFIED = 0;`\n\n### LOCAL_STORAGE\n\n Value: 1\n\nThe attack comes from fuzzing the browser's localStorage.\n\nGenerated from protobuf enum `LOCAL_STORAGE = 1;`\n\n### SESSION_STORAGE\n\n Value: 2\n\nThe attack comes from fuzzing the browser's sessionStorage.\n\nGenerated from protobuf enum `SESSION_STORAGE = 2;`\n\n### WINDOW_NAME\n\n Value: 3\n\nThe attack comes from fuzzing the window's name property.\n\nGenerated from protobuf enum `WINDOW_NAME = 3;`\n\n### REFERRER\n\n Value: 4\n\nThe attack comes from fuzzing the referrer property.\n\nGenerated from protobuf enum `REFERRER = 4;`\n\n### FORM_INPUT\n\n Value: 5\n\nThe attack comes from fuzzing an input element.\n\nGenerated from protobuf enum `FORM_INPUT = 5;`\n\n### COOKIE\n\n Value: 6\n\nThe attack comes from fuzzing the browser's cookies.\n\nGenerated from protobuf enum `COOKIE = 6;`\n\n### POST_MESSAGE\n\n Value: 7\n\nThe attack comes from hijacking the post messaging mechanism.\n\nGenerated from protobuf enum `POST_MESSAGE = 7;`\n\n### GET_PARAMETERS\n\n Value: 8\n\nThe attack comes from fuzzing parameters in the url.\n\nGenerated from protobuf enum `GET_PARAMETERS = 8;`\n\n### URL_FRAGMENT\n\n Value: 9\n\nThe attack comes from fuzzing the fragment in the url.\n\nGenerated from protobuf enum `URL_FRAGMENT = 9;`\n\n### HTML_COMMENT\n\n Value: 10\n\nThe attack comes from fuzzing the HTML comments.\n\nGenerated from protobuf enum `HTML_COMMENT = 10;`\n\n### POST_PARAMETERS\n\n Value: 11\n\nThe attack comes from fuzzing the POST parameters.\n\nGenerated from protobuf enum `POST_PARAMETERS = 11;`\n\n### PROTOCOL\n\n Value: 12\n\nThe attack comes from fuzzing the protocol.\n\nGenerated from protobuf enum `PROTOCOL = 12;`\n\n### STORED_XSS\n\n Value: 13\n\nThe attack comes from the server side and is stored.\n\nGenerated from protobuf enum `STORED_XSS = 13;`\n\n### SAME_ORIGIN\n\n Value: 14\n\nThe attack is a Same-Origin Method Execution attack via a GET parameter.\n\nGenerated from protobuf enum `SAME_ORIGIN = 14;`\n\n### USER_CONTROLLABLE_URL\n\n Value: 15\n\nThe attack payload is received from a third-party host via a URL that is\nuser-controllable\n\nGenerated from protobuf enum `USER_CONTROLLABLE_URL = 15;`"]]