International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 105

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015


Automation of Mutated Cross Site Scripting

Anchal Tiwari, J. Jeysree


Abstract: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.


Keywords: Cross Site Scripting, Mutation in DOM, innerHTML propriety


Edition: Volume 4 Issue 4, April 2015,


Pages: 1274 - 1277


How to Cite this Article?

Anchal Tiwari, J. Jeysree, "Automation of Mutated Cross Site Scripting", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB152876, Volume 4 Issue 4, April 2015, 1274 - 1277

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cross'

Downloads: 328 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 82

Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020

Pages: 502 - 505

Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya

Yvonne Oyaro Opiyo, David Nzuki

Share this Article

Similar Articles with Keyword 'Site'

Downloads: 4

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 955 - 961

Fake Text Identification using Feature Extraction

Peketi Yamini

Share this Article

Downloads: 86

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Similar Articles with Keyword 'Scripting'

Downloads: 99

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Downloads: 115

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2137 - 2142

Multiple Prevention Techniques for Different Attacks in Web Application

Tejal V. Kasture, Pinaki P. Dixit, Pooja S. Ovhal, Gayatri Sathe, Neelam A. Zambre

Share this Article

Similar Articles with Keyword 'DOM'

Downloads: 328 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Student Project, Information Technology, India, Volume 10 Issue 12, December 2021

Pages: 695 - 698

Intrusion Detection using Machine Learning Techniques

Akshay Kaushik, Varun Goel

Share this Article
Top