Solving Cross-Origin Resource Sharing II

This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.

PRO

content

MEDIUM

Difficulty

Between 1 and 2 hours

on average

45

Completed this exercise