I am studying the xss reflected and I\'m having some problems to understand what\'s happening in the following scenario. I completed a lab in which I was able to exploit a xss r