2020
DOI: 10.14569/ijacsa.2020.0110481
|View full text |Cite
|
Sign up to set email alerts
|

Cross-site Scripting Research: A Review

Abstract: Cross-site scripting is one of the severe problems in Web Applications. With more connected devices which uses different Web Applications for every job, the risk of XSS attacks is increasing. In Web applications, hacker steals victims session details or other important information by exploiting XSS vulnerabilities. We studied 412 research papers on cross-site scripting, which are published in between 2002 to 2019. Most of the existing XSS prevention methods are Dynamic analysis, Static analysis, Proxy based me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Specifically, the attacker exploits web applications vulnerable to SQL Injection attack [130] to gain unauthorized access to the database, compromising sensitive information and system security. Additionally, the attacker launches other code injection attacks, such as LDAP Injection attack [131], [132], DLL Injection attack [133], XML Injection attack [134]- [136], and cross-site scripting (XSS) attack [137]- [139], to insert malicious code and manipulate user input, further jeopardizing the system's integrity and user credentials. Such code injection attacks pose severe risks to industrial IIoT enterprise applications, potentially leading to data breaches, disclosure of sensitive information, and loss of business profits, which may result in significant financial harm.…”
Section: Hacking Scenario On Application Layermentioning
confidence: 99%
“…Specifically, the attacker exploits web applications vulnerable to SQL Injection attack [130] to gain unauthorized access to the database, compromising sensitive information and system security. Additionally, the attacker launches other code injection attacks, such as LDAP Injection attack [131], [132], DLL Injection attack [133], XML Injection attack [134]- [136], and cross-site scripting (XSS) attack [137]- [139], to insert malicious code and manipulate user input, further jeopardizing the system's integrity and user credentials. Such code injection attacks pose severe risks to industrial IIoT enterprise applications, potentially leading to data breaches, disclosure of sensitive information, and loss of business profits, which may result in significant financial harm.…”
Section: Hacking Scenario On Application Layermentioning
confidence: 99%
“…(Open Web Application Security Project) [26]. Data in the form of general vulnerabilities that often occur on a website and their identification, such as Cross-Site Request Forgery [27], Directory Transversal, Local File Inclusion [28], Remote File Execution, SQL Injection [29], Cross-Site Scripting [30]. The data used is vulnerability data that often occurs in websites, namely HTML codes that can cause bugs.…”
Section: Research Datamentioning
confidence: 99%
“…Internet service users today have different educational backgrounds and ages. With the more widespread use, the more vulnerable network security is to attacks (Nagarjun & Ahamad, 2020). To avoid unexpected conditions, it is necessary to monitor and disseminate good information for internet service users.…”
Section: Introductionmentioning
confidence: 99%