TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Submit a Pull Request to Inject Arbitrary JavaScript Code into Trump's Site

4 点作者 morninj将近 9 年前

2 条评论

a3n将近 9 年前
A similar thing happened to Microsoft ten years back, when they hotlinked to an image on flickr and violated the CC licensing by doing so. The owner of the image swapped out his original image at the link, replacing it with the infamous goatse image, which appeared on Microsoft&#x27;s site for some period of time.<p>The image owner wrote it up on his blog. You don&#x27;t <i>really</i> need to follow links to the goatse image or a screenshot of the Microsoft page displaying the image, but they are there: <a href="http:&#x2F;&#x2F;www.niallkennedy.com&#x2F;blog&#x2F;2006&#x2F;12&#x2F;microsoft-copyright-photograph.html" rel="nofollow">http:&#x2F;&#x2F;www.niallkennedy.com&#x2F;blog&#x2F;2006&#x2F;12&#x2F;microsoft-copyright...</a>
morninj将近 9 年前
(This vulnerability has been fixed, but there wasn&#x27;t enough space in the title field to say so.)