The document discusses various attacks that can be carried out using new features introduced in HTML5, even on websites that do not currently support HTML5. It describes attacks such as cross-site scripting using new HTML5 elements and event attributes, creating reverse web shells using cross-origin resource sharing, bypassing clickjacking defenses using drag and drop APIs and iframe sandboxing, poisoning HTML5 caches, performing client-side remote file inclusion and cross-site posting by controlling AJAX requests, and performing network reconnaissance like port scanning within internal networks using cross-domain XMLHttpRequests and WebSockets. The attacks show that HTML5 introduces new security risks even before its features are widely adopted.