From eb5d53862e3ca87bacff2a7f68e4db2df8954eff Mon Sep 17 00:00:00 2001 From: Mrxn Date: Mon, 30 Mar 2020 18:40:43 +0800 Subject: [PATCH] =?UTF-8?q?add=20=E9=80=9A=E8=BF=87=E5=B0=86JavaScript?= =?UTF-8?q?=E9=9A=90=E8=97=8F=E5=9C=A8PNG=E5=9B=BE=E7=89=87=E4=B8=AD?= =?UTF-8?q?=EF=BC=8C=E7=BB=95=E8=BF=87CSP?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 323286e..ab80d7d 100644 --- a/README.md +++ b/README.md @@ -313,6 +313,7 @@ - [ThinkPHP v6.0.0_6.0.1 任意文件操作漏洞分析](./books/ThinkPHP%20v6.0.0_6.0.1%20任意文件操作漏洞分析.pdf) - [Django_CVE-2020-9402_Geo_SQL注入分析](./books/Django_CVE-2020-9402_Geo_SQL注入分析.pdf) - [CVE-2020-10189_Zoho_ManageEngine_Desktop_Central_10反序列化远程代码执行](./books/CVE-2020-10189_Zoho_ManageEngine_Desktop_Central_10反序列化远程代码执行.pdf) +- [通过将JavaScript隐藏在PNG图片中,绕过CSP](https://www.secjuice.com/hiding-javascript-in-png-csp-bypass/) ## 说明