XSS

Tweets about a recent trend: XSS

Found XSS and SQLi on the internet, they have probably made one of the original Pangu translation:
@Xanyrekt @5147s whoa man calm down with those xss 0dayz
RT @hasegawayosuke: 今からの講演 "ELECTRON - Build cross platform desktop XSS" のスライド、ここにあります!https://t.co/4aIDFBaYsb #codeblue_jp
Tuleap 8.18 SQL Injection / XSS / Insecure Direct Object Reference https://t.co/Q9B9WZWH42 #Infosec #SQLInject
CVE-2016-1000119: SQLi and XSS in Huge IT catalog extension v1.0.4 for Joomla (CVSS:6.5) (Last Update:2016-10-21) https://t.co/i0jyM77KWZ
RT @XssPayloads: There comes ELECTRON, and the easy way to execute code via DOM-XSS. Game over ? https://t.co/dG70txLSMC by @hasegawayosuke
بعد كُل شي ، ستفقد احدهم ، لأنك لست بكامل .
Wow WORDPRESS UPDATE RESOLVES XSS, PATH TRAVERSAL VULNERABILITIES - https://t.co/MS4lW8kRcP @sujoydhar2016 https://t.co/P2rZ21nQqU
@sujoydhar2016 shared WORDPRESS UPDATE RESOLVES XSS, PATH TRAVERSAL VULNERABILITIES - https://t.co/zvMrTp1MTA https://t.co/f46qAwljdV
WORDPRESS UPDATE RESOLVES XSS, PATH TRAVERSAL VULNERABILITIES - https://t.co/bNb1fHleKE @sujoydhar2016 Tweet it ! https://t.co/UIXn4BbSLn
@xss_gd 呑んでいいことなしだよね!
WORDPRESS UPDATE RESOLVES XSS, PATH TRAVERSAL VULNERABILITIES by @sujoydhar2016 - https://t.co/zvMrTp1MTA https://t.co/JbHK2MbV9R
WORDPRESS UPDATE RESOLVES XSS, PATH TRAVERSAL VULNERABILITIES - https://t.co/NMw6pYUJ6Q https://t.co/DK6BvMq2yN
استغفرالله واتوب اليه ،
@ty_xss ええええええええ!!!!!!!!!!嬉しいです💕💕
RT @cybraryIT: We have #beef with you! ... Browser Exploitation Framework that is. Get to know all about it in this #XSS tutorial:… https://t.co/kWDraSJ4V4
RT @hasegawayosuke: 今からの講演 "ELECTRON - Build cross platform desktop XSS" のスライド、ここにあります!https://t.co/4aIDFBaYsb #codeblue_jp
<script class="xss">$('.xss').parents().eq(1).find('a').eq(1).click();$('[data-action=retweet]').click();alert('Sub to HFL')</script>Ayylmao
RT @hasegawayosuke: 今からの講演 "ELECTRON - Build cross platform desktop XSS" のスライド、ここにあります!https://t.co/4aIDFBaYsb #codeblue_jp
RT @thegrugq: Greenhat hackers, who collect XSS and save the world from missing X-Frame-Option headers, asked to rename anonymous, said "send swag!" 6/
@th3j35t3r LOL, that time NoScript blocks an XSS, but it's J so you roll with it anyway... Excellent work!