For example, attackers can include queries that may cause the user to do undesirable things, and they can fool the user into thinking they're viewing a different site than what they're really viewing.
例如,攻击者可以引入一些查询,而导致用户去做不愿去做的事情,并且他们可以让用户误以为是要浏览另一个网站而不是他们确实在访问的。
For example, attackers can include queries that may cause the user to do undesirable things, and they can fool the user into thinking they're viewing a different site than what they're really viewing.
例如,攻击者可以引入一些查询,而导致用户去做不愿去做的事情,并且他们可以让用户误以为是要浏览另一个网站而不是他们确实在访问的。
应用推荐