Reference documentation and code samples for the Google Cloud Web Security Scanner V1 Client class AttackVector.
Types of XSS attack vector.
Protobuf type google.cloud.websecurityscanner.v1.Xss.AttackVector
Namespace
Google \ Cloud \ WebSecurityScanner \ V1 \ XssMethods
static::name
Parameter | |
---|---|
Name | Description |
value |
mixed
|
static::value
Parameter | |
---|---|
Name | Description |
name |
mixed
|
Constants
ATTACK_VECTOR_UNSPECIFIED
Value: 0
Unknown attack vector.
Generated from protobuf enum ATTACK_VECTOR_UNSPECIFIED = 0;
LOCAL_STORAGE
Value: 1
The attack comes from fuzzing the browser's localStorage.
Generated from protobuf enum LOCAL_STORAGE = 1;
SESSION_STORAGE
Value: 2
The attack comes from fuzzing the browser's sessionStorage.
Generated from protobuf enum SESSION_STORAGE = 2;
WINDOW_NAME
Value: 3
The attack comes from fuzzing the window's name property.
Generated from protobuf enum WINDOW_NAME = 3;
REFERRER
Value: 4
The attack comes from fuzzing the referrer property.
Generated from protobuf enum REFERRER = 4;
FORM_INPUT
Value: 5
The attack comes from fuzzing an input element.
Generated from protobuf enum FORM_INPUT = 5;
COOKIE
Value: 6
The attack comes from fuzzing the browser's cookies.
Generated from protobuf enum COOKIE = 6;
POST_MESSAGE
Value: 7
The attack comes from hijacking the post messaging mechanism.
Generated from protobuf enum POST_MESSAGE = 7;
GET_PARAMETERS
Value: 8
The attack comes from fuzzing parameters in the url.
Generated from protobuf enum GET_PARAMETERS = 8;
URL_FRAGMENT
Value: 9
The attack comes from fuzzing the fragment in the url.
Generated from protobuf enum URL_FRAGMENT = 9;
HTML_COMMENT
Value: 10
The attack comes from fuzzing the HTML comments.
Generated from protobuf enum HTML_COMMENT = 10;
POST_PARAMETERS
Value: 11
The attack comes from fuzzing the POST parameters.
Generated from protobuf enum POST_PARAMETERS = 11;
PROTOCOL
Value: 12
The attack comes from fuzzing the protocol.
Generated from protobuf enum PROTOCOL = 12;
STORED_XSS
Value: 13
The attack comes from the server side and is stored.
Generated from protobuf enum STORED_XSS = 13;
SAME_ORIGIN
Value: 14
The attack is a Same-Origin Method Execution attack via a GET parameter.
Generated from protobuf enum SAME_ORIGIN = 14;
USER_CONTROLLABLE_URL
Value: 15
The attack payload is received from a third-party host via a URL that is user-controllable
Generated from protobuf enum USER_CONTROLLABLE_URL = 15;