Google Cloud Web Security Scanner V1 Client - Class AttackVector (1.0.5)

Reference documentation and code samples for the Google Cloud Web Security Scanner V1 Client class AttackVector.

Types of XSS attack vector.

Protobuf type google.cloud.websecurityscanner.v1.Xss.AttackVector

Namespace

Google \ Cloud \ WebSecurityScanner \ V1 \ Xss

Methods

static::name

Parameter
Name
Description
value
mixed

static::value

Parameter
Name
Description
name
mixed

Constants

ATTACK_VECTOR_UNSPECIFIED

  Value: 0 
 

Unknown attack vector.

Generated from protobuf enum ATTACK_VECTOR_UNSPECIFIED = 0;

LOCAL_STORAGE

  Value: 1 
 

The attack comes from fuzzing the browser's localStorage.

Generated from protobuf enum LOCAL_STORAGE = 1;

SESSION_STORAGE

  Value: 2 
 

The attack comes from fuzzing the browser's sessionStorage.

Generated from protobuf enum SESSION_STORAGE = 2;

WINDOW_NAME

  Value: 3 
 

The attack comes from fuzzing the window's name property.

Generated from protobuf enum WINDOW_NAME = 3;

REFERRER

  Value: 4 
 

The attack comes from fuzzing the referrer property.

Generated from protobuf enum REFERRER = 4;

FORM_INPUT

  Value: 5 
 

The attack comes from fuzzing an input element.

Generated from protobuf enum FORM_INPUT = 5;

  Value: 6 
 

The attack comes from fuzzing the browser's cookies.

Generated from protobuf enum COOKIE = 6;

POST_MESSAGE

  Value: 7 
 

The attack comes from hijacking the post messaging mechanism.

Generated from protobuf enum POST_MESSAGE = 7;

GET_PARAMETERS

  Value: 8 
 

The attack comes from fuzzing parameters in the url.

Generated from protobuf enum GET_PARAMETERS = 8;

URL_FRAGMENT

  Value: 9 
 

The attack comes from fuzzing the fragment in the url.

Generated from protobuf enum URL_FRAGMENT = 9;

HTML_COMMENT

  Value: 10 
 

The attack comes from fuzzing the HTML comments.

Generated from protobuf enum HTML_COMMENT = 10;

POST_PARAMETERS

  Value: 11 
 

The attack comes from fuzzing the POST parameters.

Generated from protobuf enum POST_PARAMETERS = 11;

PROTOCOL

  Value: 12 
 

The attack comes from fuzzing the protocol.

Generated from protobuf enum PROTOCOL = 12;

STORED_XSS

  Value: 13 
 

The attack comes from the server side and is stored.

Generated from protobuf enum STORED_XSS = 13;

SAME_ORIGIN

  Value: 14 
 

The attack is a Same-Origin Method Execution attack via a GET parameter.

Generated from protobuf enum SAME_ORIGIN = 14;

USER_CONTROLLABLE_URL

  Value: 15 
 

The attack payload is received from a third-party host via a URL that is user-controllable

Generated from protobuf enum USER_CONTROLLABLE_URL = 15;

Create a Mobile Website
View Site in Mobile | Classic
Share by: