You’ll read more about XSS later.
你之后会看到关于xss的更多内容。
Stolen cookies: XSS attack results
cookie 受窃:XSS攻击的后果
How to secure a site against XSS attacks?
如何保护站点不受XSS攻击?
An XSS attack leads to undesirable effects.
XSS攻击会导致不良后果。
Listing 2. An example URL for reflected XSS.
清单2.reflected XSS攻击的一个示例url。
In many cases CSRF and XSS will help to do so.
在许多情况下,CSRF和XSS都有助于这样做。
Other ways to perform traditional XSS attacks.
执行传统的XSS攻击的其他方式。
Ways to check whether your site is protected from XSS.
检查您的站点是否处于XSS攻击保护的方法。
In the Name box, type alert (" You got me with XSS ");.
在Name框中,输入alert (“Yougotmewith XSS ”);。
Guard against Cross-Site Scripting (XSS) vulnerabilities.
保护跨站点脚本(Cross - site scripting,XSS)漏洞。
Now he knows that the site is prone to an XSS-style attack.
现在他知道这个站点容易受xss类型的攻击。
It's now almost impossible to have an accidental XSS attack.
现在偶然出现一个XSS攻击已经不太可能了。
To protect against XSS attacks, you need to scrub all inputs.
要防止遭受 XSS攻击,需要清理所有输入。
This is a very simple example of a harmless XSS exploitation.
这是一个无害的XSS攻击的简单示例。
Protecting yourself and your application from XSS is important.
保护您自己和您的应用程序免受XSS攻击是非常重要的。
The first is by far the most popular: cross-site scripting (XSS).
第一个漏洞是最流行的:跨站脚本编程(cross - site scripting,XSS)。
XSS results from malicious scripts being injected into a Web site.
XSS由注入Web站点的恶意脚本而导致。
The TLD file for our XSS custom tag library, is shown in Listing 1.
清单1显示了我们的xss定制标记库的tld文件。
This security restriction is to avoid cross-site scripting attacks (XSS).
这个安全限制是为了避免跨站点脚本攻击(XSS)。
What better name is there for our custom tag library besides naming it XSS?
除了将我们的定制标记库命名为 XSS 之外,还有什么更好的叫法吗?
You've probably heard this called cross-site scripting (XSS) vulnerabilities.
您可能听说过称为cross - sitescripting (XSS)的漏洞。
Listing 10 demonstrates how the form could print the results, allowing an XSS attack.
清单10演示了允许XSS攻击的表单如何输出结果。
At the core of a traditional XSS attack lies a vulnerable script in the vulnerable site.
传统的XSS攻击的核心处位于脆弱的站点中的脆弱的脚本。
A user can help reduce his susceptibility to an XSS-style attack in five significant ways
用户可以通过5 个有效手段来减少XSS 类型的攻击
The following is a checklist of ways for webmasters and developers to prevent XSS attacks.
下面是站点管理员和开发人员可用来阻止XSS攻击的检查列表。
Finally, make sure your PHP code is resilient to XSS attacks, form spoofs, and CSRF attacks.
最后,确保PHP代码可以抵抗XSS攻击、表单欺骗和CSRF攻击。
In either case, input value validation and sanitization are the key to preventing XSS attacks.
不管怎样,输入值验证和数据消毒(sanitation)是防止XSS攻击的关键因素。
This piece of code is vulnerable to XSS attacks because no check is made to validate the input.
这段代码很容易受xss攻击,因为没有进行任何的输入验证。
Unlike those, the XSS attack involves three parties: the attacker, the client, and the Web site.
与那些攻击不同的是,XSS攻击同时涉及三个群体:黑客、客户端和Web站点。
XSS has been used to steal passwords, steal credit card Numbers, forge news stories, and much more.
XSS曾被用于窃取密码、窃取信用卡卡号、伪造新闻等等。
应用推荐