XSS by using onclick · Issue #8000 · Dolibarr/dolibarr · GitHub
Por um escritor misterioso
Descrição
Bug The xss filter in "htdocs/main.inc.php" is not enough, we can just use "onclick" and "onscroll" to bypass the filter,eg: <div style="position:absolute;top:0;left:0;width:100%;height:100%" onclick="alert(52)"> , <body onscroll=alert(1
GitHub - dxa4481/XSSJacking: Abusing Self-XSS and Clickjacking to
65536 messages in process buffer, 100% utilized - Graylog Central
xss · Issue #1 · n00pme/n00pme.github.io · GitHub
xss · Issue #1 · n00pme/n00pme.github.io · GitHub
XSS-LOADER : Xss Payload Generator, Scanner & Dork Finder - Kali
10 Practical scenarios for XSS attacks
XSS-Loader - XSS Scanner and Payload Generator - GeeksforGeeks
Doli_Install : Dolibarr installation/upgrade script - Installing
wizlynx group Multiple Reflected & Stored Cross-Site Scripting
GitHub - kleiton0x00/XSScope: XSScope is one of the most powerful