Search Type: Posts; User: caustic
Search: Search took 0.03 seconds.
21 Nov 2009 5:51 AM
By the way, here is a simple demonstration of the vulnerability.
Open Editor Grid Example in your browser. Please prefer Firefox for now. Try editing any of the grid cells, paste the following...
21 Nov 2009 5:33 AM
I'm sorry to disappoint you, but this approach will make the problem even worse. It only pretends to fix it, giving you false hope for security.
By the way, you simply can't do this kind of...
17 Nov 2009 5:27 AM
No, we do not acknowledge that silly decision. Consider the following example: It is ok for the same server to serve both desktop and web applications at the same time. In this scenario it is the...
17 Nov 2009 4:35 AM
This case is very uncommon, so this is why by default ExtJS should encode every piece of user supplied data prior to displaying it, but have options to configure it to behave in insecure way just for...
1 Jul 2009 4:50 AM
There is a problem with drag and drop functionality in Internet Explorer.
1 Sep 2008 11:13 AM
Several people have already suggested this behavior for ExtJS, and I'm for it too.
1 Sep 2008 11:08 AM
Take for example this forum. Or any Drupal installation. By the way, read Handle text in a secure fashion from its documentation.
20 Aug 2008 9:55 AM
But this is completely different problem! You can avoid SQL injections by, for example (I really mean _example_), not using a relational database at all. That is, you can store all your data in...
Could not find such option in ExtJS 2.2, missing it greatly.
20 Aug 2008 5:25 AM
Omg, this is completely wrong. It irritates me how people don't understand such simple, trivial things. You should always save raw, unescaped data, as entered by a user to the database. It is only...
Results 1 to 10 of 10