Skip to content
This repository has been archived by the owner on Feb 2, 2021. It is now read-only.

AttackVectors

Kevin Reid edited this page Apr 16, 2015 · 1 revision

(legacy summary: Interpreter&Browser properties that can be exploited to escalate privileges.)

Properties of Interpreters or the Browser Environment that allow Privilege Escalation

Below is a list of known attack vectors. We discuss the EcmaScript 3 language, quirks of existing interpreters, and browser specific extensions that could allow privilege escalation so that we can come up with tests for a safe JavaScript rewriter or verifier.

Attack Vectors at the EcmaScript/JavaScript level

Attack Vectors at the Browser Environment, DOM, HTML, or CSS levels

Clone this wiki locally