使用 YUI 网格时奇怪的图像注入

发布于 2024-09-10 04:26:48 字数 1597 浏览 7 评论 0原文

我正在尝试使用 YUI 网格,我注意到我的网页上出现了一些奇怪的情况:

<img id="fvdkoff-target-image" style="border: medium none ; margin: 0px; position: relative; visibility: visible; color: transparent; z-index: 2147483647; left: 424px; top: 274px;" src="data:image/png;base64,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"/>

我想知道是否有人遇到这个问题?

上面奇怪的图像注入有点破坏了我网站的设计。

有人可以帮忙吗?

看看这里: http://140.119.19.139/media_user/layout14/sample.html< /a>

顺便说一句,注入的奇怪代码并没有出现在源代码中。但是,如果您尝试使用 FireBug 调试页面并单击页脚下方的空白区域,它将清楚地显示注入的代码。

最好的。

I was trying to use YUI grid and i noticed something weird coming up on my webpage:

<img id="fvdkoff-target-image" style="border: medium none ; margin: 0px; position: relative; visibility: visible; color: transparent; z-index: 2147483647; left: 424px; top: 274px;" src="data:image/png;base64,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"/>

I was wondering if anyone faced this issue?

the above weird image injection kindda breaks my website's design.

Can anyone help?

Take a look at here: http://140.119.19.139/media_user/layout14/sample.html

by the way, the weird code injected doesnt show up in the source code. however, if you try to debug the page using FireBug and click on the white space below the footer, it will clearly show the injected code.

best.

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(2

猫卆 2024-09-17 04:26:48

当我用 Firebug 检查页面时,我没有得到图像。我确实看到了空白。它在那里是因为 Reset-fonts-grid.css 将 html 元素的背景设置为白色。

如果您在 Firebug 中选择 html 元素并在样式检查器中关闭 background 规则,您的背景将按预期运行。

至于这张图片,我不知道它是什么,为什么你看到它而我看不到,或者它来自哪里,但谷歌搜索“fvdkf image”显示它到处弹出。

作为旁注,这篇文章已经发布了 40 分钟,并且已经在 google 结果中排名第 4。

When I inspect the page with Firebug I don't get the image. I do see the white space. Its there because reset-fonts-grid.css is setting the background of the html element to white.

If you select the html element in Firebug and toggle off the background rule in the style inspector your background behaves as expected.

As for the image, I don't know what it is, why you see it and I don't, or where it came from, but google searches on "fvdkf image" show it popping up all over the place.

As a sidenote, this post has been live for 40 minutes and its already the #4 google result.

拒绝两难 2024-09-17 04:26:48

我猜这可能是某种脚本注入,但“src”属性是一个编码字符串,呈现为 .png 文件 - 就像一个小文字气泡图标。尝试复制该值并将其粘贴到浏览器的地址栏中进行查看。这有帮助吗?

I guess it could be some sort of script injection, but the 'src' attribute is an encoded string that renders as a .png file - like a little word bubble icon. try copying the value and pasting it into the address bar of your browser to take a look. Does that help?

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文