Our Cross-site Scripting Cheat Sheet is a FREE resource and provides a summary of everything you need to know about the topic. We know that security parameters are ever changing and we're pleased to announced that we've updated our Cheat Sheet to be current and fresh. Within the Cross-site Scripting Cheat Sheet you'll find;

  • Key Concepts of an XSS Attack,
  • Cross-site Scripting Code Examples,
  • Tips to avoid Cross-site Scripting Hacks.

If you've downloaded the resource in the past be sure to get your updated version and if you have yet to check it out grab your copy of the Cross-site Scripting Cheat Sheet today!

About Neil DuPaul

Neil manages the blog pipeline at Veracode, often by fending off eager contributors with a stick. He manages much of the Veracode web presence while also motivating the more introspective Veracoders to be social. Lover of sports and outdoors, and a SERP enthusiast, hit him up on Twitter here.

Comments (4)

swapna | March 18, 2013 3:03 am

I want to download the document

ndupaul | March 18, 2013 12:13 pm

swapna - if you click through and fill out the form it will be made available to you.

Let me know if I can do anything to help.

Pradeep Singh | March 21, 2013 4:08 am

Why do you detect this as a CSS vulnerability?

The string is getting printed inside a textarea. Which browser interprets such a string? Name one. If this is not a CSS vulnerability then update your system and offer a rescan immediately.

This would be a CSS vulnerability if the code was like this -

This is something a browser will interpret. Not the string in a textarea.

Pradeep Singh | March 22, 2013 7:32 pm


Where's the CSS vulnerability in this as per your system?

Please Post Your Comments & Reviews

Your email address will not be published. Required fields are marked *

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.