Unsafe Functions
eval()
is eval! This functions and similar ones (document.write()
, document.writeln()
, element.innerHTML
, element.outerHTML
, element.insertAdjacentHTML()
) should never be used in production stage of a website, because the parsing of the executable string is often not secure and result therefore often in a cross-site scripting vulnerability. Instead of these functions create html elements by script and add it to the DOM object. document.write(_dfltmsg);
[http://1freegayporn.com/]document.write("This page has moved, <A HREF='https://subscribe.steersearch.com/?skipEmail=1&q=&tp1=9PO670475&tp2=1freegayporn.com&tp3=lve&custom_tags=%7B%22merge_pid%22%3A%22%22%2C%22gcat%22%3A%22Online%20Communities%20%3E%20Dating%20%26%20Personals%22%7D&jserror=1'>Click here to go there.");
[http://1freegayporn.com/]