J.Z.Y

Results 4 comments of J.Z.Y

It's b/c UTF-8 code involved in some test cases, which also has ascii code falling btn 1-31. What's better way to address this issue in your view?

Hi Nick, yes, I already Url decoded the sample before sending it to Libinjection. Have you seen a SQLi attack(in Url decoded form) contains binary bytes like 0x05, 0x06, that...

I also tried this in ModSec smoke test, the first line is "973343 XSS Attack Detected via Libinjection". http://www.modsecurity.org/demo/demo-deny.html?test=on%3Dx Yes, I use the source downloaded a week ago.

You may consider traverse all scopes recursively, starting from globalScope: ``` var ast = esprima.parse(code, { loc : true }); var globalScope = dfatool.newGlobalScope(); dfatool.buildScope(ast, globalScope); globalScope.initialize(); globalScope.derivation() ... ......