developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting

Preview meta tags from the developer.mozilla.org website.

Linked Hostnames

11

Thumbnail

Search Engine Appearance

Google

https://developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting

Cross-site scripting (XSS) - Glossary | MDN

A cross-site scripting (XSS) attack is one in which an attacker is able to get a target site to execute malicious code as though it was part of the website. The code can then do anything that the site's own code can do. For example, the attacker could:



Bing

Cross-site scripting (XSS) - Glossary | MDN

https://developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting

A cross-site scripting (XSS) attack is one in which an attacker is able to get a target site to execute malicious code as though it was part of the website. The code can then do anything that the site's own code can do. For example, the attacker could:



DuckDuckGo

https://developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting

Cross-site scripting (XSS) - Glossary | MDN

A cross-site scripting (XSS) attack is one in which an attacker is able to get a target site to execute malicious code as though it was part of the website. The code can then do anything that the site's own code can do. For example, the attacker could:

  • General Meta Tags

    9
    • title
      Cross-site scripting (XSS) - Glossary | MDN
    • title
      MDN Web Docs
    • title
      MDN logo
    • charset
      utf-8
    • viewport
      width=device-width,initial-scale=1
  • Open Graph Meta Tags

    11
    • og:url
      https://developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting
    • og:title
      Cross-site scripting (XSS) - Glossary | MDN
    • og:type
      website
    • US country flagog:locale
      en_US
    • og:description
      A cross-site scripting (XSS) attack is one in which an attacker is able to get a target site to execute malicious code as though it was part of the website. The code can then do anything that the site's own code can do. For example, the attacker could:
  • Twitter Meta Tags

    2
    • twitter:card
      summary_large_image
    • twitter:creator
      MozDevNet
  • Link Tags

    9
    • alternate
      https://developer.mozilla.org/en-US/blog/rss.xml
    • alternate icon
      https://developer.mozilla.org/favicon.svg
    • apple-touch-icon
      https://developer.mozilla.org/apple-touch-icon.528534bba673c38049c2.png
    • canonical
      https://developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting
    • manifest
      https://developer.mozilla.org/manifest.f42880861b394dd4dc9b.json
  • Website Locales

    7
    • DE country flagde
      https://developer.mozilla.org/de/docs/Glossary/Cross-site_scripting
    • EN country flagen
      https://developer.mozilla.org/en-US/docs/Glossary/Cross-site_scripting
    • ES country flages
      https://developer.mozilla.org/es/docs/Glossary/Cross-site_scripting
    • FR country flagfr
      https://developer.mozilla.org/fr/docs/Glossary/Cross-site_scripting
    • JA country flagja
      https://developer.mozilla.org/ja/docs/Glossary/Cross-site_scripting

Links

678