Google Cloud Web Security Scanner V1 Client - Class AttackVector (0.8.5)

Reference documentation and code samples for the Google Cloud Web Security Scanner V1 Client class AttackVector.

Types of XSS attack vector.

Protobuf type google.cloud.websecurityscanner.v1.Xss.AttackVector

Namespace

Google \ Cloud \ WebSecurityScanner \ V1 \ Xss

Methods

static::name

Parameter
Name Description
value mixed

static::value

Parameter
Name Description
name mixed

Constants

ATTACK_VECTOR_UNSPECIFIED

Value: 0

Unknown attack vector.

Generated from protobuf enum ATTACK_VECTOR_UNSPECIFIED = 0;

LOCAL_STORAGE

Value: 1

The attack comes from fuzzing the browser's localStorage.

Generated from protobuf enum LOCAL_STORAGE = 1;

SESSION_STORAGE

Value: 2

The attack comes from fuzzing the browser's sessionStorage.

Generated from protobuf enum SESSION_STORAGE = 2;

WINDOW_NAME

Value: 3

The attack comes from fuzzing the window's name property.

Generated from protobuf enum WINDOW_NAME = 3;

REFERRER

Value: 4

The attack comes from fuzzing the referrer property.

Generated from protobuf enum REFERRER = 4;

FORM_INPUT

Value: 5

The attack comes from fuzzing an input element.

Generated from protobuf enum FORM_INPUT = 5;

Value: 6

The attack comes from fuzzing the browser's cookies.

Generated from protobuf enum COOKIE = 6;

POST_MESSAGE

Value: 7

The attack comes from hijacking the post messaging mechanism.

Generated from protobuf enum POST_MESSAGE = 7;

GET_PARAMETERS

Value: 8

The attack comes from fuzzing parameters in the url.

Generated from protobuf enum GET_PARAMETERS = 8;

URL_FRAGMENT

Value: 9

The attack comes from fuzzing the fragment in the url.

Generated from protobuf enum URL_FRAGMENT = 9;

HTML_COMMENT

Value: 10

The attack comes from fuzzing the HTML comments.

Generated from protobuf enum HTML_COMMENT = 10;

POST_PARAMETERS

Value: 11

The attack comes from fuzzing the POST parameters.

Generated from protobuf enum POST_PARAMETERS = 11;

PROTOCOL

Value: 12

The attack comes from fuzzing the protocol.

Generated from protobuf enum PROTOCOL = 12;

STORED_XSS

Value: 13

The attack comes from the server side and is stored.

Generated from protobuf enum STORED_XSS = 13;

SAME_ORIGIN

Value: 14

The attack is a Same-Origin Method Execution attack via a GET parameter.

Generated from protobuf enum SAME_ORIGIN = 14;

USER_CONTROLLABLE_URL

Value: 15

The attack payload is received from a third-party host via a URL that is user-controllable

Generated from protobuf enum USER_CONTROLLABLE_URL = 15;