Skip to content

Instantly share code, notes, and snippets.

View k0ns0l's full-sized avatar
🎯
Focusing

Mansur k0ns0l

🎯
Focusing
View GitHub Profile
<div id="scrollBuddy" style="top: 0px;">
<div class="head"></div>
<div class="body"></div>
<div class="left-arm" style="transform: rotate(90deg);"></div>
<div class="left-arm-lower" style="transform: translate(6.12323e-16px, 10px) rotate(92.8284deg);"></div>
<div class="right-arm" style="transform: rotate(90deg);"></div>
<div class="right-arm-lower" style="transform: translate(6.12323e-16px, 10px) rotate(87.1716deg);"></div>
<div class="left-leg-upper" style="transform: rotate(90deg);"></div>
<div class="left-leg-lower" style="transform: translate(7.34788e-16px, 12px) rotate(75.8579deg);"></div>
<div class="left-foot" style="transform: translate(2.44328px, 21.6969px) rotate(180deg);"></div>

Multiple vulnerabilities in jQuery Mobile

Summary

All current versions of jQuery Mobile (JQM) as of 2019-05-04 are vulnerable to DOM-based Cross-Site Scripting (XSS) via crafted URLs. In JQM versions up to and including 1.2.1, the only requirement is that the library is included in a web application. In versions > 1.2.1, the web application must also contain a server-side API that reflects back user input as part of an HTTP response of any type. Practically all non-trivial web applications contain at least one such API.

Additionally, all current versions of JQM contain a broken implementation of a URL parser, which can lead to security issues in affected applications.

@jboner
jboner / latency.txt
Last active August 1, 2025 22:01
Latency Numbers Every Programmer Should Know
Latency Comparison Numbers (~2012)
----------------------------------
L1 cache reference 0.5 ns
Branch mispredict 5 ns
L2 cache reference 7 ns 14x L1 cache
Mutex lock/unlock 25 ns
Main memory reference 100 ns 20x L2 cache, 200x L1 cache
Compress 1K bytes with Zippy 3,000 ns 3 us
Send 1K bytes over 1 Gbps network 10,000 ns 10 us
Read 4K randomly from SSD* 150,000 ns 150 us ~1GB/sec SSD