2016 2nd International Conference on Next Generation Computing Technologies (NGCT) 2016
DOI: 10.1109/ngct.2016.7877529
|View full text |Cite
|
Sign up to set email alerts
|

XSS vulnerability assessment and prevention in web application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 3 publications
0
7
0
2
Order By: Relevance
“…This vulnerability makes it possible for attackers to interfere with user interaction with the OS or an application by allowing them to circumvent same origin policy [23], [24]…”
Section: Xss (Crosssite Scripting)mentioning
confidence: 99%
“…This vulnerability makes it possible for attackers to interfere with user interaction with the OS or an application by allowing them to circumvent same origin policy [23], [24]…”
Section: Xss (Crosssite Scripting)mentioning
confidence: 99%
“…Классическим примером является вредоносный скрипт, вставленный злоумышленником в поле комментариев в блоге или в сообщения на форуме. Когда жертва переходит на уязвимую веб-страницу в браузере, полезная нагрузка XSS будет использоваться как часть самой веб-страницы (точно также, как и сами законные комментарии) [16]. Это означает, что жертвы, в конечном итоге, случайно выполнят вредоносный сценарий, как только страница будет просмотрена в браузере.…”
Section: типы межсайтовых скриптовunclassified
“…Eventually, they found a system vulnerability in Tom and Winmail that confirmed the availability of the technology. In the paper published by Ankit Shrivastava, he detailed how to steal Webmail users cookies for identity theft through a reflective XSS vulnerability [17]. Jun Yang's team used a vocabulary-based fuzzy framework to construct a mutated XSS attack vectors [18].…”
Section: Related Workmentioning
confidence: 99%