Difference between revisions of "Cross-site scripting"
From Wiki @ Karl Jones dot com
Karl Jones (Talk | contribs) (→External Links) |
Karl Jones (Talk | contribs) (→See also) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 18: | Line 18: | ||
* [[Client-side scripting]] | * [[Client-side scripting]] | ||
* [[Computer security]] | * [[Computer security]] | ||
+ | * [[Cross-origin resource sharing]] | ||
* [[HTTP cookie]] | * [[HTTP cookie]] | ||
* [[Same-origin policy]] | * [[Same-origin policy]] | ||
Line 27: | Line 28: | ||
[[Category:Computer science]] | [[Category:Computer science]] | ||
+ | [[Category:Internet security]] | ||
+ | [[Category:Security]] | ||
[[Category:Web design and development]] | [[Category:Web design and development]] | ||
[[Category:Web security]] | [[Category:Web security]] |
Latest revision as of 18:04, 24 April 2016
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications.
Description
XSS enables attackers to inject client-side script into web pages viewed by other users.
Same-origin policy
A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
Effects
The effect of XSS may range from a petty nuisance to a significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner.
See also
- Ajax (programming)
- Client-side scripting
- Computer security
- Cross-origin resource sharing
- HTTP cookie
- Same-origin policy
- Web security
External Links
- Cross-site scripting @ Wikipedia