![]() ![]() Most times, Reflected and Stored Cross-Site-Scripting vulnerabilities are caused by unsecured GET or POST parameters however, this is not always the case. ![]() The main risks which can affect the users are the stealing of cookies, falling victims to phishing attacks or of unwillingly losing control over the browser. Usually, this breach permits the injection/insertion of malicious HTML code or JavaScript in the pages of websites by using some unsecured parameters or inadequately secured parameters. Lately, the most common vulnerability, which can be found even in the sites pertaining to big brands, is called Cross-Site-Scripting (XSS) and it represents an opportunity for the attackers to encroach on the user’s safety. Many times, due to lack of attention or understanding, programmers might ignore the review of the code, resulting in security breaches, which through exploiting represent a threat to the confidentiality of the users’ data and to the security of the server. A fundamental aspect of web applications which developers should bear in mind is securing the input inserted by the user. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |