Back to the previous page
Test Case ID | ![]() |
Bad / Good / Mixed | Good![]() |
Author | Fortify Software |
Associations | |
Added by | Jeff Meister |
Language | Java |
Type of test case | Source Code |
Input string | <script language=javascript>alert(\"gotcha\")</script> |
Expected Output | |
Instructions | |
Submission date | 2006-06-22 |
Description | Tainted output allows cross-site scripting attack. (fixed version 2) |
File(s) |
|
Flaw |
There are no comments
Have any comments on this test case? Please,
.
File Contains:
CWE-079: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') on line(s): 0
CWE-079: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') on line(s): 0