Tweets
-
@veeeeep We reported it like months and months before.. -
@y3dips Clipboard.swf was where the issue occurred. -
#XSS in#acunetix.com {Now Fixed}.. PoC URL- http://www.acunetix.com/wp-content/plugins/wp-syntaxhighlighter/syntaxhighlighter2/scripts/clipboard.swf?highlighterId …\%22))}catch(e){}alert(1);// pic.twitter.com/X1SqqLz0hU11:56 PM - 28 Oct 13 · Details Flagged (learn more) -
Thanks to
@rafaybaloch for another responsible disclosure! -
@contrastsec Not yet...but i will definitely try it in a day or two.. -
Ooh yeah, so here we go another
#WHMCS Vulnerability ;) http://localhost.re/p/whmcs-v5210-vulnerability … -
@acunetix Is acunetix able to analyze obfuscated javascript?. -
@acunetix Nice, How about Stored DOM XSS and stuff with local storage? -
Congratulations
@insertScript, Best wishes. -
@cgvwzq Finally you have a profile pic ^^ -
@contrastsec Gonna test your XSS detection system soon...Cheers -
What if there were a simple way to learn more about cross-site scripting attacks? Oh, yeah, there is: http://cntr.st/1cOSiys
#XSS#Code -
@secalert Eager to see your findings ^^... -
@secalert Congrats bro...When are you doing the write-up? -
-
@DidierStevens Sample videos look awesome... -
@cyberboyIndia Yes i have plans for doing that, just wait till i finish writing my book.
@rafaybaloch hasn't tweeted yet.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Flag this media
This has already been marked as containing sensitive content.