This “feature” can be disabled by sending the non-standard HTTP header X-XSS-Protection
on the affected page.
X-XSS-Protection: 0
More Related Contents:
- How to prevent Javascript injection attacks within user-generated HTML
- Is it possible to get data from HTML forms into android while using webView?
- Hacked Site – SSH to remove a large body of javascript from 200+ files [closed]
- Exploiting JavaScript’s eval() method
- jquery .get not getting [closed]
- Download a file by jQuery.Ajax
- Difference between innerText, innerHTML and value?
- iFrame src change event detection?
- How to get JS variable to retain value after page refresh? [duplicate]
- JavaScript regex multiline text between two tags
- Show or hide element in React
- Vuejs Error: The client-side rendered virtual DOM tree is not matching server-rendered
- Detect multiple keys on single keypress event in jQuery
- What is difference between Axios and Fetch?
- Map isn’t showing on Google Maps JavaScript API v3 when nested in a div tag
- How can I pre-set arguments in JavaScript function call? (Partial Function Application)
- Prevent orientation change in iOS Safari
- ES6 tagged templates practical usability
- Remove empty strings from array while keeping record Without Loop?
- How can I replace newlines/line breaks with spaces in javascript?
- Is it possible to programmatically catch all events on the page in the browser?
- Javascript getElementsByName.value not working [duplicate]
- Wrap long template literal line to multiline without creating a new line in the string
- how to check if a form is valid programmatically using jQuery Validation Plugin
- Legitimate uses of the Function constructor
- jQuery validate – set conditional rules based on user selection
- Accessing Angular inside Protractor Test
- Generating sound on the fly with javascript/html5
- Javascript Date Plus 2 Weeks (14 days)
- Javascript float subtract