Solving Cross-Origin Resource Sharing II

This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.

PRO

content

MEDIUM

Difficulty

Less than an hour

on average

291

Completed this exercise