International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 99

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015


Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George


Abstract: Cross-site scripting (XSS) is a type of security vulnerability typically found in web applications which allows the attackers to inject malicious script into web pages/servers. XSS is the main cause of DOM attack. This add-on is a penetration testing tool to detect DOM vulnerabilities in Web Applications. This tool detects the DOM vulnerabilities based on xss vulnerabilities in the web page. It provides a penetration tester the ability to test all kinds of xss vulnerabilities. This add-on will be useful for web application developers in detecting DOM vulnerabilities early in the development process will help protect a web application from unnecessary flaws.


Keywords: Vulnerability Testing, Cross-site scripting, Web Applications, Security, Code Insertion,


Edition: Volume 4 Issue 4, April 2015,


Pages: 1635 - 1639


How to Cite this Article?

Saranraj Ilangovan, Geogen George, "Developing Firefox add-on for DOM vulnerability Assessment", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB153449, Volume 4 Issue 4, April 2015, 1635 - 1639

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Web Applications'

Downloads: 109

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Downloads: 113

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1160 - 1163

Dynamic Application Development for Web Application Process

Saranya Seera, Y. Sangeetha

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'Vulnerability'

Downloads: 104

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Similar Articles with Keyword 'Testing'

Downloads: 82 | Monthly Hits: ⮙1

Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020

Pages: 502 - 505

Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya

Yvonne Oyaro Opiyo, David Nzuki

Share this Article

Downloads: 101

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2439 - 2441

Improving the Reliability of the Automation Framework based on Code Coverage Analysis

Snehalata Giraddi, Merin Meleet

Share this Article

Similar Articles with Keyword 'scripting'

Downloads: 105

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1274 - 1277

Automation of Mutated Cross Site Scripting

Anchal Tiwari, J. Jeysree

Share this Article

Downloads: 115

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2137 - 2142

Multiple Prevention Techniques for Different Attacks in Web Application

Tejal V. Kasture, Pinaki P. Dixit, Pooja S. Ovhal, Gayatri Sathe, Neelam A. Zambre

Share this Article

Similar Articles with Keyword 'Web'

Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 955 - 961

Fake Text Identification using Feature Extraction

Peketi Yamini

Share this Article

Downloads: 62 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 9 Issue 12, December 2020

Pages: 1710 - 1711

E-Learning

Dr. Rajani D. Shionkar

Share this Article

Similar Articles with Keyword 'Applications'

Downloads: 50

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article

Downloads: 91 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article
Top