The threats of cross-site scripting.
跨站点脚本编制的威胁。
Learn more about cross-site scripting on Wikipedia.
在Wikipedia了解有关跨站点脚本 的更多信息。
Cross-site scripting attacks pose an immense risk.
跨站点脚本攻击带来了巨大的风险。
Guard against Cross-Site Scripting (XSS) vulnerabilities.
保护跨站点脚本(Cross - site scripting,XSS)漏洞。
This prevents cross-site scripting, a nasty attack method.
这可以防止跨站点脚本,一个令人讨厌的攻击方法。
The first is by far the most popular: cross-site scripting (XSS).
第一个漏洞是最流行的:跨站脚本编程(cross - site scripting,XSS)。
I recommend you read How To: Prevent Cross-Site Scripting in ASP.
我建议你阅读如何防止跨站点脚本在ASP。
This security risk is referred to as a cross-site scripting attack.
这种安全性风险被称为跨网站脚本攻击。
This security restriction is to avoid cross-site scripting attacks (XSS).
这个安全限制是为了避免跨站点脚本攻击(XSS)。
You've probably heard this called cross-site scripting (XSS) vulnerabilities.
您可能听说过称为cross - site scripting (XSS)的漏洞。
This script is vulnerable to cross-site scripting attacks because it blindly prints out submitted form data.
该脚本容易受跨站点脚本攻击,因为它盲目输出所提交的表单数据。
Cross-site scripting poses server application risks that include, but are not limited to, the following.
跨站点脚本编制将服务器应用程序置于危险之中,这些危险包括(但不限于)以下几种情况。
Among them, the cross-site scripting attack is one of the most prevalent and pernicious security issues.
其中,跨站脚本攻击是一种最为广泛,也最具有威胁的攻击方式之一。
Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks.
可编辑数据验证——为了去除跨站点脚本和SQL注入攻击,HDIV分析所有的可编辑数据域。
In this article, we discussed how attackers use cross-site scripting as a technique to launch attacks against Web sites.
本文中,我们讨论了攻击者如何使用跨站点脚本编制作为对网站发动攻击的技术。
Every month cross-site scripting attacks are found in commercial sites and advisories are published explaining the threat.
商业站点上每月都会发现跨站点脚本编制的攻击,并且每月都会发布解释这种威胁的报告。
After an application on a Web site is known to be vulnerable to cross-site scripting, an attacker can formulate an attack.
当攻击者知道某一网站上的应用程序易受跨站点脚本编制攻击后,他就可以规划攻击。
Security issues when binding cross-documents: Limitations in the current dynamic/Ajax solutions prevent cross-site scripting.
跨文档进行绑定的安全问题:当前的动态/Ajax解决方案中的限制防止跨站点脚本编制。
Ajax Chat has security in mind to prevent code injections, SQL injections, cross-site scripting, session stealing, and other attacks.
AjaxChat还具有安全性,能够防止代码注入、SQL注入、跨站点脚本攻击、会话偷窃以及其他攻击。
Contains some additional security hardening, like preventing cross-site scripting that could be triggered only by administrators.
包括一些额外的安全硬伤,比如阻止跨站点脚本,这些只能由管理员触发。
When an attacker introduces a malicious script to a dynamic form submitted by the user, a cross-site scripting (XSS) attack then occurs.
当攻击者向用户提交的动态表单引入恶意脚本时,就会产生跨站点脚本(XSS)攻击。
Cross-site scripting (XSS for short) is one of the most common application-level attacks that hackers use to sneak into Web applications.
跨站脚本攻击(cross - site scripting,简称XSS),是黑客用来潜入Web应用程序的最普遍的应用程序层攻击之一。
By keeping the code server side, you reduce the risk of any malicious activity through cross-site scripting, SQL injection, and so on.
通过将代码放在服务器端,减少了通过跨站点脚本、SQL注入等手段进行恶意活动的风险。
Since attackers are usually trying to add malicious scripts, this particular variation is called a "cross-site scripting attack" (XSS attack).
由于攻击者通常是试图添加恶意的脚本,因些这种变化被称为“交叉站点脚本攻击” (XSS攻击)。
The first, and probably the most severe, is a Cross-Site Scripting (XSS) vulnerability discovered by Brian Mastenbrook and reported on his blog.
第一,可能是最严重的就是BrianMastenbook发现的跨站脚本(XSS)的脆弱,并且在他的博客中报告了这个问题。
Statistics show that hackers are skilled at using techniques such as cross-site scripting to penetrate perimeter defenses and reach the database.
统计数据说明,黑客完全有能力使用跨站点脚本等技术突破防御边界,到达数据库。
The software can also be scanned for security issues, such as cross-site scripting and Structured Query Language (SQL) injection vulnerabilities.
软件还可以扫描安全性问题,例如跨站点的脚本以及StructuredQueryLanguage (SQL)注射脆弱性。
In the case of cross-site scripting prevention, you need to filter out the escape characters for the scripting languages supported by the browser.
对于跨站点脚本预防情况,您需要过滤掉浏览器支持的脚本语言的转义字符。
Cross-site scripting (XSS) and SQL Injection are considered the weakest points in software, while the buffer overflow comes third, according to cwe.
根据CWE的列表,跨平台脚本攻击(XSS)和SQL注入被认为是软件最薄弱的环节,而位于第三位的是缓冲区溢出。
Max shows in this use case that Flume tackles problems well beyond known vulnerability types (buffer overrun, cross-site scripting and SQL injection).
Max以此用例说明Flume能解决的问题远不止已知的缺陷类型(缓冲区溢出、跨站脚本以及SQL注入)。
应用推荐