window.open(url, name) is vulnerable to XSS with name collision · Issue #262 · w3c/html · GitHub
Por um escritor misterioso
Last updated 03 março 2025
Xiaoran Wang (xiaoran@attacker-domain.com) This is a joint research with Travis Safford. window.open(url, name, [args]) makes it easy for websites accepting user supplied URLs to be vulnerable when attackers can cause a collision on the

10 Practical scenarios for XSS attacks

Automating Discovery and Exploiting DOM (Client) XSS Vulnerabilities using Sboxr — Part 3, by Riyaz Walikar
DOM-based cross-site scripting (DOM_XSS) issue found in angular.js in Coverity scan · Issue #17045 · angular/angular.js · GitHub
When `window.name` is evaluated #xss · GitHub

AppSec-Labs, Application Security
GitHub - cak/XSS-Challenge: A simple Cross-Site Scripting (XSS) challenge with multiple contexts and filters.
Missing required argument $name · Issue #294 · Smile-SA/elasticsuite · GitHub
Open-Redirect-Payloads/Open-Redirect-payloads.txt at master · cujanovic/Open-Redirect-Payloads · GitHub

JNDI-Related Vulnerability Discovered in H2 Database Console

eclipse - The type org.openqa.selenium.chrome.ChromeDriver is not accessible - Stack Overflow

writeups/bug.md at main · tess-ss/writeups · GitHub
Recomendado para você
-
What is XSS?, Understanding Cross-Site Scripting03 março 2025
-
AHMAD YUSSEF on LinkedIn: #bugbountytips #cybersecurity #xss #bugs03 março 2025
-
BUG BOUNTY TIPS: ALTERNATE WAY TO FIND BLIND XSS03 março 2025
-
Security Hustle03 março 2025
-
Exploiting DVWA Using Reflected Cross-Site Scripting (XSS)03 março 2025
-
Xsss store03 março 2025
-
DC SHOES SKATE COURT GRAFFIK GREY - 300529 XSSS MENS UK SIZES 803 março 2025
-
DVWA 1.9+: XSS Stored with OWASP ZAP03 março 2025
-
XSSS-ZC Shelf, Removable Cabinet, Rotatable Storage Cabinet, Acrylic Multi-Functional Storage Cabinet, Bedside Table, Creative Transparent Storage03 março 2025
-
What Is Cross Site Scripting and How to Prevent It? A Complete03 março 2025
você pode gostar
-
Skins do CS:GO: O que são? Para que servem? Como obter?03 março 2025
-
Tic Tac Toe - Play Online on03 março 2025
-
Prince Hans on03 março 2025
-
Gru's Plan Meme - Imgflip03 março 2025
-
gacha gachalife pose corpo base sticker by @gacha_edit_aline03 março 2025
-
Pixel art of sans from undertale03 março 2025
-
Watch Dogs: Legion Bloodline - PC [Online Game Code03 março 2025
-
Sonic Classic Heroes 16bit MD Game Card For Sega Mega Drive03 março 2025
-
In the Pokémon anime, why hasn't Brock evolved any of his Pokémon03 março 2025
-
Regras do Jogo Escape In by mapazero - Issuu03 março 2025