2020
DOI: 10.20944/preprints202012.0063.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Tutorial on Cross Site Scripting Attack - Defense

Abstract: The danger is still very large from cross site scripting attacks. When designing web applications We must follow as much as we can prevention rules and don’t leave any loophole to our programs. Experience is a great factor for programmers to know these attacks and for a trainee programmer is a difficult task to spot all the weak points. In this article we present a tutorial on launching an XSS attack and also we propose simple solutions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Some controls require the user to input custom values. These values are encoded properly before being passed to the callback function to prevent Cross-Site Scripting (XSS) attacks [14]. To create an exercise, an initialization function and a model solution function must be created and passed to the JSAV exercise instance.…”
Section: Implementing Visualizationsmentioning
confidence: 99%
“…Some controls require the user to input custom values. These values are encoded properly before being passed to the callback function to prevent Cross-Site Scripting (XSS) attacks [14]. To create an exercise, an initialization function and a model solution function must be created and passed to the JSAV exercise instance.…”
Section: Implementing Visualizationsmentioning
confidence: 99%
“…With this action the adversary can alter the contents of an application according to his purposes and use original information in a malicious way. [20];…”
mentioning
confidence: 99%