Loading

XSS Vulnerability Assessment Procedure and Mitigation for Web Application
Y. Prathyusha Reddy1, SK. Althaf Rahaman2, K.Yasudha3

1Y. Prathyusha Reddy *, PG Student, Department of CS, GIS, GITAM (Deemed to be University), Visakhapatnam, India.
2Sk.Althaf Rahaman, Department of CS, GIS, GITAM (Deemed to be University),Visakhapatnam, India.
3K Yasudha, Department of CS, GIS, GITAM (Deemed to be University),Visakhapatnam, India.
Manuscript received on February 28, 2020. | Revised Manuscript received on March 22, 2020. | Manuscript published on March 30, 2020. | PP: 5279-5281 | Volume-8 Issue-6, March 2020. | Retrieval Number: F9709038620/2020©BEIESP | DOI: 10.35940/ijrte.F9709.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: CSS is one of the foremost routine vulnerabilities that affect many web applications. XSS attacks are essentially malicious injections (client-side) that are added to an internet page or app through user comments, form submissions, and so on. The most danger behind XSS is that it allows attackers to inject content into the online app. The injected content can modify how it’s displayed, forcing the browser to execute the attacker’s code. Web vulnerabilities are developed for scanning whole webpage of internet sites. Vulnerability Assessment is that the process of identifying vulnerabilities in your application’s environment. Vulnerability is defined as a weakness or flaw within the system that permits an attacker or insider to access the system during a way they’re not authorized.
Keywords: XSS, Vulnerability, Mitigation, Attack, Malicious.
Scope of the Article: Application specific ICs (ASICs).