Persistent XSS In Verizon

From Fiamma
Revision as of 06:46, 22 December 2016 by Pchr8 (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

https://randywestergren.com/persistent-xss-verizons-webmail-client/
Persistent XSS In Verizon

Complexity: 6 Rating: 7



Interesting scenario with generation of all possible HTMLs ( <footer onafterprint="console.log(244599)" onbeforeprint="console.log(309354)"[...] ), onwheel/oninput resulting in xss and clickjacking.