From 200a2d38d8625c2bc95710bb1e95bf86c754fb00 Mon Sep 17 00:00:00 2001 From: Anton Lopanitsyn Date: Mon, 11 Feb 2019 09:34:13 +0300 Subject: [PATCH] Fix fake xss Actually, is not XSS. Running scripts like clickme have location.origin "null". --- XSS injection/README.md | 18 ------------------ 1 file changed, 18 deletions(-) diff --git a/XSS injection/README.md b/XSS injection/README.md index ce68962..6169b46 100644 --- a/XSS injection/README.md +++ b/XSS injection/README.md @@ -122,18 +122,6 @@ you can also specify an arbitratry payload with 14.rs/#payload e.g: 14.rs/#alert(document.domain) ``` -XSS in META tag - -```javascript -Base64 encoded - - - - -With an additional URL - -``` - XSS in Hidden input ```javascript @@ -162,12 +150,6 @@ URL/