JavaScript exploit
2010-09-21 19:34:03.143226+02 by
Dan Lyke
2 comments
I have been pretty cocky about the Flutterby system's ability to keep malicious code out of user entered stuff, but I should probably re-evaluate that, especially in light of this: the Twitter JavaScript exploit that circulated and was fixed this morning.
[ related topics:
virus Invention and Design Current Events Gambling Archival
]
comments in descending chronological order (reverse):
#Comment Re: made: 2010-09-22 17:20:06.903226+02 by:
markd
And if someone maliciously did something here, the skilled retribution would be horrifying, and
wonderful, to see.
#Comment Re: made: 2010-09-22 08:55:51.347226+02 by:
meuon
I think the difference is more culture than code. If one of "us" did it, we'd show off something kewl, and then email you about it.
We will not edit your comments. However, we may delete your
comments, or cause them to be hidden behind another link, if we feel
they detract from the conversation. Commercial plugs are fine,
if they are relevant to the conversation, and if you don't
try to pretend to be a consumer. Annoying endorsements will be deleted
if you're lucky, if you're not a whole bunch of people smarter and
more articulate than you will ridicule you, and we will leave
such ridicule in place.