Active Members akkiliON Posted August 3, 2013 Active Members Report Posted August 3, 2013 # Exploit: *.zong.com - Cross-Site-Scripting Reflected# Author: akkiliON# URL Link: https://zong.com/# Status: Waiting for an response# PoC: Quote
Active Members akkiliON Posted August 3, 2013 Author Active Members Report Posted August 3, 2013 (edited) Am mai gasit inca 2 xss-uri dar intr-un alt site ( tot de paypal apartine ). Edited August 3, 2013 by akkiliON Quote
FarSe Posted August 4, 2013 Report Posted August 4, 2013 Unde exact gasesti siteurile astea de apartin de paypal? Quote
Active Members akkiliON Posted August 4, 2013 Author Active Members Report Posted August 4, 2013 Eligible DomainsThe Bug Bounty Program is valid for PayPal and its subsidiary websites, including the following “.paypal.com” domains*:ZongBillMeLaterWhereMicroplaceCard.ioBillsafe*Please note that newly acquired companies are given a six-month grace period prior to their eligibility for Bug Bounty Submissions.https://www.paypal.com/us/webapps/mpp/security-tools/reporting-security-issues Quote
Active Members akkiliON Posted August 6, 2013 Author Active Members Report Posted August 6, 2013 Am primit un mesaj ca e duplicate ! Quote