Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Home
Data Handling
Attacks that occur when an attacker uses a web application to send malicious code, generally in the...
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
edited
Mar 16, 2021
by
rajeshsharma
Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
i) XSS Attack
ii) Birthday attacks
iii) SQL injection attacks
#xss-attacks
secure-code-review
DataHandling-questions-answers
1
Answer
0
votes
answered
Mar 16, 2021
by
rajeshsharma
Correct Answer is i) XSS Attack
Related questions
0
votes
The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#encoding
secure-code-review
DataHandling-questions-answers
0
votes
Defect density alone can be used to judge the security of code accurately.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#defect-density
secure-code-review
DataHandling-questions-answers
0
votes
Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
vulnerability-type
malicious
script
ssa
0
votes
A function in which scripting tags in all dynamic content can be replaced with codes in a chosen character set.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#dynamic-coding
secure-code-review
DataHandling-questions-answers
0
votes
Which of the following can be used to prevent end users from entering malicious scripts?
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#data-validation
DataHandling-questions-answers
0
votes
The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#source-code-review
DataHandling-questions-answers
0
votes
What happens when an application takes user inputted data and sends it to a web browser, without proper validation?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
input-data
web
browser
0
votes
What happens when an application takes user inputted data, and sends it to a web browser without proper validation and escaping?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Which of the following is more resistant to SQL injection attacks?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#sql-injection-attack
secure-code-review
code-review
0
votes
________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
cyclometric-complexity
0
votes
A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
asked
Mar 16, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-code-review
code-review
0
votes
If an attacker submits multiple input parameters (query string, post data, cookies, etc) of the same name, the application may react in unexpected ways and open up new avenues of server-side
asked
Mar 9, 2022
in
Secure Programming Practices
by
sharadyadav1986
session-hijack
session-attack
0
votes
Numerical values that describe a trait of the code such as the Lines of Code come under ________.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#line-of-code
DataHandling-questions-answers
0
votes
Parameterized stored procedures are compiled after the user input is added.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#parameterized-store
secure-code-review
0
votes
What are the various files that are created when you create a Django Project? Explain briefly.
asked
Apr 3, 2020
in
Data Handling
by
amita rallin
DataHandling-questions-answers
0
votes
__________ attempts to quantify the size of the code.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-size
secure-code-review
code-review
size-code
0
votes
An email security threat that occurs when a malicious user sends an email pretending to be someone you know is called ___________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
email-security
0
votes
In a multi user multi-threaded environment, thread safety is important as one may erroneously gain access to another individuals session by exploiting ___________ .
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#code-thread-safety
DataHandling-questions-answers
0
votes
The process that gives a person permission to perform a functionality is known as -----------
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-permission
secure-code-review
0
votes
Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
string-attack
web-application-attack
secure-programming-practices
...