Maybe these 1x1 pixel sets should just automatically be blocked at the browser level.
I find them in most saved pages when i am stripping out chaff
https://torrentfreak.com/private-tracke ... it-160313/
Another 1x1 pixel vulnerability
Another 1x1 pixel vulnerability
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:23.0) Gecko/20130410 Firefox/23.0
Re: Another 1x1 pixel vulnerability
Yep, this type of thing is one of the reasons why I use tools like ABE and µMatrix to set up restrictions on cross-site requests to and from this board.
*Always* check the changelogs BEFORE updating that important software!
-
Re: Another 1x1 pixel vulnerability
So...if I'm reading correctly, the significance of the BBCode was the ability to match the client data (which could be collected by anyone who can post an image link) to a username?
======
Thrawn
------------
Religion is not the opium of the masses. Daily life is the opium of the masses.
True religion, which dares to acknowledge death and challenge the way we live, is an attempt to wake up.
Thrawn
------------
Religion is not the opium of the masses. Daily life is the opium of the masses.
True religion, which dares to acknowledge death and challenge the way we live, is an attempt to wake up.
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:44.0) Gecko/20100101 Firefox/44.0