2021
DOI: 10.1007/978-981-33-6835-4_45
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…This type of XSS attack focuses on manipulating the environment and JavaScript program code (Gan et al, 2020), the HTTP response from the original website to the victim does not change, but the client-side script runs unlike it should because the DOM environment of the page has been manipulated by the attacker (Shar & Tan, 2011). This type does not exploit web application server vulnerabilities.…”
Section: Dom-based Cross-site Scriptingmentioning
confidence: 99%
“…This type of XSS attack focuses on manipulating the environment and JavaScript program code (Gan et al, 2020), the HTTP response from the original website to the victim does not change, but the client-side script runs unlike it should because the DOM environment of the page has been manipulated by the attacker (Shar & Tan, 2011). This type does not exploit web application server vulnerabilities.…”
Section: Dom-based Cross-site Scriptingmentioning
confidence: 99%
“…The existing software for detecting XSS vulnerabilities, such as the Online Web Security Scanner, search for these vulnerabilities only in the open parts of websites that do not require access authorisation [17][18][19][20][21]. Such a drawback is significant considering that XSS vulnerabilities may be located in an unsearchable part of a web resource.…”
Section: Xss Vulnerabilities Detection Softwarementioning
confidence: 99%