window.open(url, name) is vulnerable to XSS with name collision · Issue #262 · w3c/html · GitHub
Por um escritor misterioso
Last updated 25 dezembro 2024
Xiaoran Wang (xiaoran@attacker-domain.com) This is a joint research with Travis Safford. window.open(url, name, [args]) makes it easy for websites accepting user supplied URLs to be vulnerable when attackers can cause a collision on the
Penetration testing & window.opener — XSS vectors part 1, by Josh Graham, TSS - Trusted Security Services
AppSec-Labs, Application Security
Add support for inline JS/CSS with #attached [#2391025]
GitHub - Snorlyd/https-nj.gov---CVE-2020-11022: Vulnearability Report of the New Jersey official site
Persistent XSS (unvalidated Open Graph embed) at LinkedIn.com, by Jonathan Bouman
certificate - React Native Facebook Flipper Thread 9: EXC_BAD_ACCESS (code=1, address=0x201) - Stack Overflow
Development Board · GitHub
Wacky XSS challenge write-up. On November 4th BugPoc published a new…, by Daniel Santos
GitHub - cak/XSS-Challenge: A simple Cross-Site Scripting (XSS) challenge with multiple contexts and filters.
Pre-Authentication
JSPanda - Client-Side Prototype Pullution Vulnerability Scanner
7. Front End Security Basics: DOM XSS in URL – Amal Mammadov
When `window.name` is evaluated #xss · GitHub
JNDI-Related Vulnerability Discovered in H2 Database Console
Recomendado para você
-
10 Practical scenarios for XSS attacks25 dezembro 2024
-
An unusual way to find XSS injection in one minute25 dezembro 2024
-
xsss – Tio Arthur25 dezembro 2024
-
xsss Sam Curry25 dezembro 2024
-
xsss on X: #WeLovePurposeTour / X25 dezembro 2024
-
xsss - Fiji Roads Authority25 dezembro 2024
-
XSS exploitation without using the