Describe XSS vulnerabilities.
Stored XSS (Type-I XSS): Reflected XSS (Type-II XSS): Server-side vs. DOM-based vulnerabilities:
Stored XSS (Type-I XSS): Reflected XSS (Type-II XSS): Server-side vs. DOM-based vulnerabilities:
Different ways used to prevent XSS are : Escaping: Validating Input: Sanitizing:
Cross-site scripting (XSS) is like a sneaky bug in websites that bad actors can exploit. Imagine you’re visiting a website, and this bug lets someone … Read more
CSRF Attack Conditions: Cookie-based Session Handling: No Unpredictable Request Parameters:
We can prevent CSRF attack in two ways : 1. User Side Prevention: 2. Server Side Prevention:
Cross-Site Request Forgery (CSRF) is like a sneaky online trick where a bad actor tricks you into doing something on a website without you realizing … Read more
Major web server threats are: Injection Flaws: Sensitive Data Exposure: XML External Entities: Broken Access Control: Cross-Site Scripting (XSS): Reflected XSS: Cross-Site Request Forgery (CSRF): … Read more
Cookies: Tiny Data Files: Cookies are like small text files stored by your web browser on your computer. First-Time Visit: When you visit a website … Read more
What is it? User Interface (UI): What’s that? UI Design: Making Things Look Good What’s in the Interface?
Rendering, in the context of computer graphics, refers to the process of generating an image from a 2D or 3D model using computer programs. This … Read more