649 results found (page 1 of 44)
https://www.w3.org/TR/trusted-types

…uch pattern is not present in a given program. It is often missed during manual code reviews, and automated code analysis. As an example, if aString contains untrusted data, foo[bar] = aString is a statement that potentially can trigger a vulnerability, depending on a value of fo…

https://www.w3.org/TR/CSP3

… behalf of a specific Document or Worker The execution of inline script Dynamic code execution (via eval() and similar constructs) The application of inline style Mitigate the risk of attacks which require a resource to be embedded in a malicious context (the "Pixel Perfect" atta…