@0x6D6172696F My favorite part so far is <a href="..." type="text/html"> actually doing type hints that enable XSS in impossible situations.
![.mario📎 on Twitter: "@0x6D6172696F My favorite part so far is <a href="..." type="text/html"> actually doing type hints that enable XSS in impossible situations."](https://cdn-ak-scissors.b.st-hatena.com/image/square/93a0e454318fbbebed4e230486b93db66b8e0167/height=288;version=1;width=512/https%3A%2F%2Fpbs.twimg.com%2Fprofile_images%2F940180315389100033%2FiYQcPg4n.jpg)
Copy & Pest - A case-study on the clipboard, blind trust and invisible cross-application XSS The clipboard is one of the most commonly used tools across operating systems, window managers and devices. Pressing Ctrl-C and Ctrl-V has become so fundamentally important to productivity and usability that we cannot get rid of it anymore. We happily and often thoughtlessly copy things from one source and
ECMAScript 6, in short ES6, has been boiling in a copper pot for many years by now and step-by-step, browser vendors come forward to taste the first sips of this mystery soup. So, ES6 is no longer a theoretic language but already crawled across the doorstep and now lurks under your bed, ready for the nasty, waiting for the right moment to bite. Now, what is this whole ES6 thing? How did it develop
This talk introduces and discusses a novel, mostly unpublished technique to successfully attack websites that are applied with state-of-the-art XSS protection. This attack labeled Mutation-XSS (mXSS) is capable of bypassing high-end filter systems by utilizing the browser and its unknown capabilities - every single f***** one of them. We analyzed the type and number of high-profile websites and ap
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く