• Stolen cookies: XSS attack results

    cookie 受窃:XSS攻击的后果

    youdao

  • An XSS attack leads to undesirable effects.

    XSS攻击导致不良后果

    youdao

  • Listing 10 demonstrates how the form could print the results, allowing an XSS attack.

    清单10演示允许XSS攻击表单如何输出结果

    youdao

  • At the core of a traditional XSS attack lies a vulnerable script in the vulnerable site.

    传统XSS攻击核心位于脆弱站点中的脆弱的脚本

    youdao

  • Use Regular Expression to validate input to protect from XSS attack below is Snapshot.

    下图使用正则表达式验证输入从而预防XSS攻击

    youdao

  • Unlike those, the XSS attack involves three parties: the attacker, the client, and the Web site.

    那些攻击不同是,XSS攻击同时涉及三个群体黑客客户端Web站点。

    youdao

  • The following examples are intended to help you recognize the areas that are vulnerable to XSS attack.

    下面例子可以帮助识别XSS攻击领域

    youdao

  • If you have a site with a wildcard certificate, and that site has an XSS attack reachable irrespective of Host header.

    如果站点万用证书,那么无论主机信息头部是什么样,这个站点都极可能遭受攻击

    youdao

  • So far, we have seen that an XSS attack can take place in a parameter of a GET request that is echoed back to the response by a script.

    到此为止我们已经看到XSS攻击可以出现脚本响应GET请求参数中。

    youdao

  • The goal of the XSS attack is to steal the client cookies or any other sensitive information that can identify the client with the Web site.

    XSS攻击目的盗走客户cookies或者任何可以用于Web站点确定客户身份其他敏感信息

    youdao

  • Since attackers are usually trying to add malicious scripts, this particular variation is called a "cross-site scripting attack" (XSS attack).

    由于攻击通常试图添加恶意脚本,因些这种变化称为“交叉站点脚本攻击” (XSS攻击)。

    youdao

  • A reflected XSS attack exploits vulnerable Web applications that display input parameters back to the browser without checking for the presence of active content in them.

    reflectedXSS攻击利用Web应用程序安全性低的弱点,该应用程序在浏览器中显示输入参数不对其中是否存在活动内容进行检查

    youdao

  • In this case, it is first necessary to "escape" to the free context, and then to append the XSS attack. For example, if the data is injected as a default value of an HTML form field.

    这种情况下首先必要自由环境中然后附加XSS攻击

    youdao

  • When this tag is placed with an XSS attack - which are the most common of the documented attacks - users can easily do something with their credentials without knowing it - thus, the forgery.

    标记XSS攻击结合一起时—在已归档攻击常见用户可以知情情况下轻松地凭证执行一些操作—因此是伪造的。

    youdao

  • When an attacker introduces a malicious script to a dynamic form submitted by the user, a cross-site scripting (XSS) attack then occurs.

    攻击者用户提交动态表单引入恶意脚本时,产生跨站点脚本(XSS)攻击

    youdao

  • In the next scenario, the hypothetical Web site ensures that the generated pages are properly encoded by using the XSS custom tag library and is able to protect itself from the attack.

    在下一个方案中这个虚拟网站确保生成页面通过使用xss定制标记正确编码的,并且避免攻击。

    youdao

  • A user can help reduce his susceptibility to an XSS-style attack in five significant ways

    用户可以通过5 个有效手段减少XSS 类型的攻击

    youdao

  • XSS is an attack on the privacy of clients of a particular Web site, which can lead to a total breach of security when customer details are stolen or manipulated.

    XSS针对特殊Web站点客户隐私的攻击,客户详细信息失窃受控时可能引发彻底安全威胁。

    youdao

  • XSS is an attack on the privacy of clients of a particular Web site, which can lead to a total breach of security when customer details are stolen or manipulated.

    XSS针对特殊Web站点客户隐私的攻击,客户详细信息失窃受控时可能引发彻底安全威胁。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定