Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Note that re-downloading the source prevents this attack, but does not mean that the source you are looking at is what the page is actually running - just make the web server leave out the reference to evil.js the second time an IP address requests the page...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: