🌐
GitHub
github.com › wisec › domxsswiki
GitHub - wisec/domxsswiki: Automatically exported from code.google.com/p/domxsswiki · GitHub
DOM XSS Test Cases Wiki is a KB for defining sources of attacker controlled inputs and sinks which potentially could introduce DOM Based XSS issues.
Starred by 548 users
Forked by 79 users
Languages   HTML
🌐
OWASP Foundation
owasp.org › www-community › attacks › DOM_Based_XSS
DOM Based XSS | OWASP Foundation
1. The DOM XSS Wiki - The start of a Knowledgebase for defining sources of attacker controlled inputs and sinks which could potentially introduce DOM Based XSS issues. Its very immature as of 11/17/2011.
🌐
Google Code
code.google.com › archive › p › domxsswiki › wikis › Introduction.wiki
Google Code Archive - Long-term storage for Google Code Project Hosting.
Archive · Skip to content · The Google Code Archive requires JavaScript to be enabled in your browser · Google · About Google · Privacy · Terms
🌐
Cobalt
cobalt.io › homepage › vulnerability wiki › validation & sanitization exploits › dom-based xss
Dom-Based XSS | Pentest Vulnerability Wiki
April 4, 2022 - This Wiki is a unique database with vulnerability Proof of Concepts to act as a resource for pentesters. The findings are categorized by the OWASP ASVS category. V5 - Validation / Sanitization · ** jquery.prettyPhoto.js is used in this PoC since it’s vulnerable to DOM XSS ·
🌐
Haxoris
haxoris.com › haxoris-wiki › web-owasp-top-10 › injection › dom-based-xss
DOM-Based Cross-Site Scripting (XSS) - Haxoris Wiki
DOM-based Cross-Site Scripting (XSS) is a variant of XSS where the entire exploit occurs in the Document Object Model (DOM) within the victim's browser, without sending malicious data to the server.
🌐
MediaWiki
mediawiki.org › wiki › DOM-based_XSS
DOM-based XSS - MediaWiki
DOM-based XSS (or type-0 XSS) is a type of Cross-site scripting attack that occurs when client-side scripts (such as JavaScript) manipulate the page's DOM, allowing an attacker to run JavaScript in the victim's browser.
🌐
GitHub
github.com › trucpt › DOMXSSWiki
GitHub - trucpt/DOMXSSWiki: https://code.google.com/archive/p/domxsswiki/
The DOMXSS Wiki is a Knowledge Base for defining sources of attacker controlled inputs and sinks which potentially could introduce DOM Based XSS issues.
Author   trucpt
🌐
GitHub
github.com › wisec › domxsswiki › wiki
Home · wisec/domxsswiki Wiki · GitHub
The DOMXSS Wiki is a Knowledge Base for defining sources of attacker controlled inputs and sinks which potentially could introduce DOM Based XSS issues.
Author   wisec
🌐
Zacheller
wiki.zacheller.dev › web-app-pentest › xss › domxss
DOMXSS | SecWiki
DOM XSS (Document Object Model-based Cross-site Scripting) uses the HTML environment to execute malicious javascript.
Find elsewhere
🌐
Wikipedia
en.wikipedia.org › wiki › Cross-site_scripting
Cross-site scripting - Wikipedia
3 weeks ago - As the JavaScript code was also processing user input and rendering it in the web page content, a new sub-class of reflected XSS attacks started to appear that was called DOM-based cross-site scripting. In a DOM-based XSS attack, the malicious data does not touch the web server.
🌐
Shieldfy
shieldfy.io › security-wiki › cross-site-scripting › dom-xss
DOM based XSS , Security WIKI | Automated security assistant for developers
DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs in an “unexpected” ...
🌐
HackTricks
book.hacktricks.xyz › home › pentesting web › xss cross site scripting › dom xss
DOM XSS - HackTricks
This kind of XSS is probably the hardest to find, as you need to look inside the JS code, see if it’s using any object whose value you control, and in that case, see if there is any way to abuse it to execute arbitrary JS. https://github.com/mozilla/eslint-plugin-no-unsanitized · Browser extension to check every data taht reaches a potential sink: https://github.com/kevin-mizu/domloggerpp
🌐
PortSwigger
portswigger.net › web-security › cross-site-scripting › dom-based
What is DOM-based XSS (cross-site scripting)? Tutorial & Examples | Web Security Academy
In this section, we'll describe DOM-based cross-site scripting (DOM XSS), explain how to find DOM XSS vulnerabilities, and talk about how to exploit DOM XSS with different sources and sinks.
🌐
CQR
cqr.company › web-vulnerabilities › dom-xss-using-web-messages
Wiki | DOM XSS using web messages | CQR
DOM-based Cross-Site Scripting (XSS) vulnerabilities using web messages occur when a web application improperly handles incoming data from web messages (often through the postMessage API) without proper validation or sanitization, and this data ...
🌐
Quora
quora.com › What-is-DOM-based-XSS-What-is-an-explanation-of-it
What is DOM based XSS? What is an explanation of it? - Quora
Answer (1 of 3): DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a result of modifying the DOM “environment” in the victim’s browser used by the original client side script, so that the client side code runs ...
🌐
CQR
cqr.company › web-vulnerabilities › dom-xss-using-web-messages-and-a-javascript-url
Wiki | DOM XSS using web messages and a JavaScript URL | CQR
DOM XSS using web messages and a JavaScript URL represents a critical security vulnerability that allows attackers to inject and execute malicious scripts within the Document Object Model (DOM) of a web application.
🌐
OWASP Cheat Sheet Series
cheatsheetseries.owasp.org › cheatsheets › DOM_based_XSS_Prevention_Cheat_Sheet.html
DOM based XSS Prevention - OWASP Cheat Sheet Series
The difference between Reflected/Stored XSS is where the attack is added or injected into the application. With Reflected/Stored the attack is injected into the application during server-side processing of requests where untrusted input is dynamically added to HTML. For DOM XSS, the attack is injected into the application during runtime in the client directly.
🌐
CQR
cqr.company › web-vulnerabilities › clickjacking-chained-with-dom-based-xss
Wiki | Clickjacking chained with DOM-Based XSS | CQR
Description: DOM-Based XSS occurs when a web application’s client-side scripts manipulate the Document Object Model (DOM) in an insecure way, allowing an attacker to inject malicious scripts that can be executed in the context of the user’s browser.
🌐
Feroot Security
feroot.com › education-center › what-is-dom-based-xss
What is DOM-based XSS? | Feroot
June 18, 2025 - DOM-based XSS is a type of cross-site scripting attack where malicious code is handled on the client side via the browser’s Document Object Model (DOM).