![]() ![]() ![]() This is because a part of the clipboard content is directly written to `innerHTML` allowing for javascript injection and thus XSS. jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. In affected versions users are subject to cross site scripting (XSS) attacks via clipboard content. Jsuites is an open source collection of common required javascript web components. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |