Search

Advanced Search

Search Only:



Total: 31 results found.
Search Keyword javascript
Page 1 of 2
«StartPrev12NextEnd»
1.
(Shop/Joomla Plugins)
Joonami is a Joomla! plugin that executes custom JavaScript when a user enters the infamous Konami code. ...
2.
(Code/Joomla!)
... $k => $v) : ?> <input type="text" value="<?php echo htmlspecialchars($v); ?>" name="<?php echo $k; ?>" /> <?php endforeach; ?> <script type="text/javascript"> document.forms[0].submit(); </script> </form> <?php ...
3.
(Code/Joomla!)
... new attributes into a link: style and onmouseover. Giving the link a large size, absolute positioning and a javascript trigger I made the contest site redirect back here. After the hackme site was no ...
4.
(Comments/All)
Jason, This is probably due to a JavaScript error, which causes the AJAX submission to fail. This is generally caused by templates or modules loading jQuery without setting it in noConflict mode, although ...
5.
(Other/Other)
This came on TV on Christmas day. I laughed so hard I nearly wet myself. Video Content This is a video. It requires the Adobe Flash plugin and JavaScript to view. If this isn't a Discordian ...
6.
(Code/Joomla!)
...  XSS 1: Nested [img] Tags [img]http://foo.com/fake.png [img] onerror=javascript:alert(String.fromCharCode(88,83,83)) [/img] [/img] XSS 2: JavaScript links [url=javascript:alert('xss');]http://google.com[/url] Requires ...
7.
(Code/Joomla!)
As part of a recent project, I needed to open a modal window using Javascript. Here's how I did it. First, I made sure the modal behavior was loaded: JHTML::_('behavior.modal'); Then, in my Javascript, ...
8.
(Code/JavaScript)
I was working on a bit of script today, and happened upon an interesting happenstance. I was trying to change the text of an element dynamically, and this text needed to include a non-breaking space. My ...
9.
(Other/Other)
... list. Feel free to submit any additions below. URL Tag Injection The [url] tag can sometimes be injected with XSS, although this will always require a user to click on the link: [url=javascript:alert(String.fromCharCode(88,83,83))]http://google.com[/url]  ...
10.
(Code/Joomla!)
... default setting upon install. To execute, simply post a new message. Either toggle the editor to 'off' or use the HTML Source editing button, insert your JavaScript, and submit! <script>alert('xss');</script> The ...
11.
(Code/Joomla!)
...  ' onmouseover='alert(String.fromCharCode(88,83,83)) ' style='color:expression(alert(String.fromCharCode(88,83,83))) [img] BBCode Tag XSS [img]http://pick.a.big/image.png' onmousemove='javascript:alert(String.fromCharCode(88,83,83))[/img]  ...
12.
(Code/Joomla!)
... there were going to be, and threw that error. What I ended up doing is rewriting the JavaScript portion using MooTools markup, as the site I was doing this for always loaded MooTools for its operation. ...
13.
(Code/Joomla!)
... JavaScript function. I also appended a CSS style tag to handle invalid inputs (I could have added these to the administrator template, but I wanted to make sure this change survived a reinstall/upgrade). ...
14.
(Code/Joomla!)
... [img] onerror=javascript:alert(String.fromCharCode(88,83,83)) [/img] [/img] Nested [url] XSS [url]http://google.com?[url] onmousemove=javascript:alert(String.fromCharCode(88,83,83));//[/url][/url]  ...
15.
(Code/JavaScript)
If you've ever done any scripting using the Mootools library that ships with Joomla, perhaps you've come across a situation where you needed to prevent a link from following it's assigned location. Mootools ...
16.
(Code/Joomla!)
Well, another XSS vulnerable BBCode implementation, this time on JTag Ticketing System. This is the exact same vulnerability I posted about earlier concerning WebAmoeba. [url=javascript:alert('xss ...
17.
(Code/Joomla!)
... since when we have two links (a link without comprofiler and a link with comprofiler) this matches both // but it is even worse when we do not remove javascript links... $string = preg_replace('/\[(top)?url\](.*?)javascript(.*?)\[\/\\1url\]/si','<span ...
18.
(Code/Joomla!)
... onerror=javascript:alert(String.fromCharCode(88,83,83)) [/img] [/img] UPDATE: This XSS works in the signature field as well as the post message. UPDATE 2: Nested [url] tags are similarly vulnerable, ...
19.
(Code/Joomla!)
I found a nice little exploit for WebAmoeba Ticket System 3.0.0, a Joomla help desk component. The vulnerability is with the BBCode library used to parse BBCode tags, as it does not strip javascript: urls ...
20.
(Other/Other)
... anything without these. 10. Javascript Beautifier This tool is an utter godsend when it comes to html or javascript code that ends up cluttered or mashed together (TinyMCE, I'm looking at you). ...
Page 1 of 2
«StartPrev12NextEnd»

The Joomla!® name is used under a limited license from Open Source Matters in the United States and other countries. Jeff Channell is not affiliated with or endorsed by Open Source Matters or the Joomla!® Project.

Santorum
Joomla Extensions