mirror of
				https://github.com/yiisoft/yii2.git
				synced 2025-11-04 06:37:55 +08:00 
			
		
		
		
	update Cross Site Scripting link (#19002)
This commit is contained in:
		@ -48,7 +48,7 @@ JavaScript や SQL のコンテキストでは、対象となる文字は別の
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
- <https://owasp.org/www-community/attacks/Command_Injection>
 | 
					- <https://owasp.org/www-community/attacks/Command_Injection>
 | 
				
			||||||
- <https://owasp.org/www-community/attacks/Code_Injection>
 | 
					- <https://owasp.org/www-community/attacks/Code_Injection>
 | 
				
			||||||
- <https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29>
 | 
					- <https://owasp.org/www-community/attacks/xss/>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
SQL インジェクションを回避する
 | 
					SQL インジェクションを回避する
 | 
				
			||||||
@ -151,7 +151,7 @@ HtmlPurifier の処理は非常に重いので、キャッシュを追加する
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
このトピックについて更に読むべき文書:
 | 
					このトピックについて更に読むべき文書:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- <https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29>
 | 
					- <https://owasp.org/www-community/attacks/xss/>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
CSRF を回避する
 | 
					CSRF を回避する
 | 
				
			||||||
 | 
				
			|||||||
@ -48,7 +48,7 @@ Yii 提供了大量的工具来在不同的上下文执行转义。
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
- <https://owasp.org/www-community/attacks/Command_Injection>
 | 
					- <https://owasp.org/www-community/attacks/Command_Injection>
 | 
				
			||||||
- <https://owasp.org/www-community/attacks/Code_Injection>
 | 
					- <https://owasp.org/www-community/attacks/Code_Injection>
 | 
				
			||||||
- <https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29>
 | 
					- <https://owasp.org/www-community/attacks/xss/>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
避免 SQL 注入
 | 
					避免 SQL 注入
 | 
				
			||||||
@ -151,7 +151,7 @@ XSS 或者跨站脚本发生在输出 HTML 到浏览器时,输出内容没有
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
进一步阅读该话题:
 | 
					进一步阅读该话题:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- <https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29>
 | 
					- <https://owasp.org/www-community/attacks/xss/>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
防止 CSRF 攻击
 | 
					防止 CSRF 攻击
 | 
				
			||||||
 | 
				
			|||||||
@ -48,7 +48,7 @@ Further reading on the topic:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
- <https://owasp.org/www-community/attacks/Command_Injection>
 | 
					- <https://owasp.org/www-community/attacks/Command_Injection>
 | 
				
			||||||
- <https://owasp.org/www-community/attacks/Code_Injection>
 | 
					- <https://owasp.org/www-community/attacks/Code_Injection>
 | 
				
			||||||
- <https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29>
 | 
					- <https://owasp.org/www-community/attacks/xss/>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Avoiding SQL injections
 | 
					Avoiding SQL injections
 | 
				
			||||||
@ -151,7 +151,7 @@ Note that HtmlPurifier processing is quite heavy so consider adding caching.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
Further reading on the topic:
 | 
					Further reading on the topic:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
- <https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29>
 | 
					- <https://owasp.org/www-community/attacks/xss/>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Avoiding CSRF
 | 
					Avoiding CSRF
 | 
				
			||||||
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user