Skip to content
Affinity IT Security
  • Cybersecurity Assessments
  • GOV Info
  • Training
  • About
  • Contact
  • Articles

OUTSOURCE YOUR CYBERSECURITY

Increase security. Maintain compliance. Retain control.

Find Out How
Find and Fix Your Vulnerabilities.  Discretely. Now Find and Fix Your Vulnerabilities.  Discretely. Now

CROSS-SITE SCRIPTING

How To Prevent Cross-Site Scripting (XSS)

February 10, 2017January 8, 2018 JoeHow To Prevent ... ?, Web Application Vulnerabilities
Preventing Cross Site Scripting (XSS)

For a description of Cross-Site Scripting (XSS), see the article entitled “What Is Cross-Site Scripting?“. For an explanation of how to detect Cross-Site Scripting (XSS) vulnerabilities, see “How To Test For Cross-Site Scripting“. The reason that Cross-Site Scripting (XSS) remains […]

Read more

How To Test For Cross-Site Scripting (XSS)

February 9, 2017January 8, 2018 JoeHow To Test For ... ?, Web Application Vulnerabilities
Testing For Cross Site Scripting (XSS)

Cross-Site Scripting (XSS) remains one of the most common security vulnerabilities currently found in web-applications. This article provides insight into how to test your applications for Cross-Site Scripting (XSS) defects using both manual and automated means. For an introductory description […]

Read more

What is Cross-Site Scripting (XSS) ?

February 9, 2017January 18, 2018 JoeWeb Application Vulnerabilities, What Is ... ?
What Is Cross Site Scripting (XSS)

Cross-site Scripting is a common web-application vulnerability that results from untrusted-input being returned to a Web Browser without validation and/or proper modification.  The failure of a web-application to validate input data and/or to neutralize certain characters allows inputs to be […]

Read more
Bank of America logo Chubb institute logo emblem logo BNP Paribas logo CME group logo

Recent Posts

  • The City of Charleston, Capital City of West Virginia, Awards Affinity IT Security Services Network Security and Audit Services Contract
  • Affinity IT Security Services Awarded GSA Schedule for Highly Adaptive Cybersecurity Services
  • Changing the SDLC to Produce Secure Applications
  • Affinity IT Security Services Has New Focus on Critical Infrastructure Protection
  • Designing Secure API Services
  • On Complexity, Convenience, Risk, and Privacy

Categories

  • 1O Things …
  • How To Prevent … ?
  • How To Test For … ?
  • Press Releases
  • Reasons Why…
  • Uncategorized
  • Web Application Vulnerabilities
  • What Is … ?

Follow Affinity IT Security


Notice: Undefined index: screen_name in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 40

Notice: Undefined index: verified in /var/www/html/wp-content/plugins/custom-twitter-feeds/templates/header.php on line 21

Notice: Undefined index: profile_image_url_https in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 371

AffinityITSec Follow


Notice: Undefined offset: 0 in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CtfFeed.php on line 1924

Notice: Undefined offset: 0 in /var/www/html/wp-content/plugins/custom-twitter-feeds/templates/item.php on line 12

Notice: Undefined offset: 0 in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Display_Elements.php on line 22

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 67

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 67

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 67

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 67

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 31

Notice: Undefined offset: 0 in /var/www/html/wp-content/plugins/custom-twitter-feeds/templates/item.php on line 18

Notice: Undefined offset: 0 in /var/www/html/wp-content/plugins/custom-twitter-feeds/templates/item.php on line 19

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 58

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 58

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 67

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 67

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 27

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 136

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 136

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 145

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 154

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 154

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 145
@ ·
now


Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 31

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 67

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 67

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 489

Notice: Trying to access array offset on value of type null in /var/www/html/wp-content/plugins/custom-twitter-feeds/inc/CTF_Parse.php on line 497
Reply on Twitter Retweet on Twitter Like on Twitter Twitter
Load More

Cybersecurity is more critical than ever before. You need a partner with the right expertise.

Find and fix your vulnerabilities. Do it discreetly. Do it now.

Find and Fix Your Vulnerabilities. Discretely. Now

1243 Sussex Turnpike Suite #1, Randolph, NJ 07869
info@Affinity-IT.com
800.840.2335
  • 23 NYCRR 500 Compliance
  • About Us
  • Affinity IT Security
  • Application Security Testing
  • Articles
  • Be a Professional Hacker
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Penetration Tester
  • Best Hacker School
  • Best Hacking School
  • CEH Bootcamp
  • CEH Certification
  • CEH Exam
  • CEH Exam Preparation
  • CEH Instruction
  • Certified Ethical Hacker (CEH) Exam
  • Certified Ethical Hacker (CEH) Training Class
  • Choose the RIGHT Cybersecurity Partner
  • Contact Us
  • Cybersecurity Compliance
  • Cybersecurity Compliance Inquiry
  • EC Council CEH Accredited Training Center
  • Ethical Hacker Course
  • Ethical Hacker Course
  • Ethical Hacking Course
  • Getting Your CEH
  • GOV Info
  • Hacker Bootcamp
  • Hacker Training
  • HIPAA Compliance
  • Information Security Assessments and Penetration Tests
  • Information Security Training Inquiry
  • Learn Ethical Hacking
  • Learn Penetration Testing
  • Learn PenTesting
  • Network Security Testing
  • Network Vulnerability Assessment
  • PCI DSS Compliance
  • Penetration Test Training
  • Penetration Testing and Vulnerability Assessments Inquiry
  • Penetration Testing Bootcamp
  • Penetration Testing Course
  • Penetration Testing School
  • Pentesting Bootcamp
  • Pentesting Course
  • Pentesting School
  • Prepare For The CEH Test
  • Training
  • Training Course: Application Security and the SDLC
  • Training Course: Designing Secure Web Applications
  • Training Course: Employee IT Security Awareness
  • Training Course: Fundamentals of IT Security
  • Training Course: Gathering and Documenting Web Application Security Requirements
  • Training Course: Testing Web Application Security
  • Training Course: Understanding HIPAA Security Compliance
  • Training Course: Understanding NERC-CIP
  • Training Course: Understanding PCI-DSS
  • Website Security Testing
  • Website Vulnerability Assessment
  • What Cybersecurity Services Do You Actually Need ?
Powered by WordPress | Theme: Astrid by aThemes.