Active Members akkiliON Posted August 3, 2013 Active Members Report Share Posted August 3, 2013 # Exploit: *.zong.com - Cross-Site-Scripting Reflected# Author: akkiliON# URL Link: https://zong.com/# Status: Waiting for an response# PoC: Quote Link to comment Share on other sites More sharing options...
Matt Posted August 3, 2013 Report Share Posted August 3, 2013 Felicitari, nu-i lasa sa respire. Quote Link to comment Share on other sites More sharing options...
Active Members akkiliON Posted August 3, 2013 Author Active Members Report Share Posted August 3, 2013 (edited) Am mai gasit inca 2 xss-uri dar intr-un alt site ( tot de paypal apartine ). Edited August 3, 2013 by akkiliON Quote Link to comment Share on other sites More sharing options...
FarSe Posted August 4, 2013 Report Share Posted August 4, 2013 Unde exact gasesti siteurile astea de apartin de paypal? Quote Link to comment Share on other sites More sharing options...
Active Members akkiliON Posted August 4, 2013 Author Active Members Report Share Posted August 4, 2013 Eligible DomainsThe Bug Bounty Program is valid for PayPal and its subsidiary websites, including the following “.paypal.com” domains*:ZongBillMeLaterWhereMicroplaceCard.ioBillsafe*Please note that newly acquired companies are given a six-month grace period prior to their eligibility for Bug Bounty Submissions.https://www.paypal.com/us/webapps/mpp/security-tools/reporting-security-issues Quote Link to comment Share on other sites More sharing options...
Active Members akkiliON Posted August 6, 2013 Author Active Members Report Share Posted August 6, 2013 Am primit un mesaj ca e duplicate ! Quote Link to comment Share on other sites More sharing options...