Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Cache: http://i.imgur.com/uJUofyS.png

For those wondering

    {{eval(String.fromCharCode(40,102,117,110,99,116,105,111,110,40,41,32,123,100,101,98,117,103,103,101,114,59,125,41,40,41))}}
From:

    'String.fromCharCode(' + ('(function() {debugger;})()'.split('').map(function(c) { return c.charCodeAt(0) }).join()) + ')'


The site is over quota and I have no clue what your comment means.


It was working a second ago. It's just a way to execute javascript code.

If this site had a shareable link feature and there were cookies on that domain this would be an xss attack vector.


Sorry, what I meant was, I have no clue what relevance eval'ing a function that calls debugger has to the article.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: