In this case, it is first necessary to "escape" to the free context, and then to append the XSS attack. For example, if the data is injected as a default value of an HTML form field.
在这种情况下,首先必要的是“逃”到自由的环境中,然后附加XSS攻击。
If this is the case in your repository, then you will have to escape each character before passing it on.
如果您的存储库是这种情况,那么必须对每个字符进行转义,然后再传递。
In the case of cross-site scripting prevention, you need to filter out the escape characters for the scripting languages supported by the browser.
对于跨站点脚本预防情况,您需要过滤掉浏览器支持的脚本语言的转义字符。
应用推荐