Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Home
Data Handling
Attacks that occur when an attacker uses a web application to send malicious code, generally in the...
0
votes
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
edited
Mar 16, 2021
by
rajeshsharma
Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
i) XSS Attack
ii) Birthday attacks
iii) SQL injection attacks
#xss-attacks
secure-code-review
DataHandling-questions-answers
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 16, 2021
by
rajeshsharma
Correct Answer is i) XSS Attack
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#encoding
secure-code-review
DataHandling-questions-answers
0
votes
Q: Defect density alone can be used to judge the security of code accurately.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#defect-density
secure-code-review
DataHandling-questions-answers
0
votes
Q: Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
vulnerability-type
malicious
script
ssa
0
votes
Q: A function in which scripting tags in all dynamic content can be replaced with codes in a chosen character set.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#dynamic-coding
secure-code-review
DataHandling-questions-answers
0
votes
Q: Which of the following can be used to prevent end users from entering malicious scripts?
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#data-validation
DataHandling-questions-answers
0
votes
Q: The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#source-code-review
DataHandling-questions-answers
0
votes
Q: Which of the following is more resistant to SQL injection attacks?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#sql-injection-attack
secure-code-review
code-review
0
votes
Q: What happens when an application takes user inputted data and sends it to a web browser, without proper validation?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
input-data
web
browser
0
votes
Q: What happens when an application takes user inputted data, and sends it to a web browser without proper validation and escaping?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
Q: ________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
cyclometric-complexity
...