Hi,
On Mon, Nov 20, 2017 at 5:47 PM, Bill Cole
wrote:
> On 20 Nov 2017, at 13:31, Alex wrote:
>
>> On Mon, Nov 20, 2017 at 12:58 PM, Axb wrote:
>>>
>>> On 11/20/2017 06:26 PM, Alex wrote:
Hi, we have an email that
On 20 Nov 2017, at 13:31, Alex wrote:
On Mon, Nov 20, 2017 at 12:58 PM, Axb wrote:
On 11/20/2017 06:26 PM, Alex wrote:
Hi, we have an email that originated from email.dropbox.com and has
a
link to https://hyzas.xss.ht/ which is a "payload to test for
Cross-site
On Mon, Nov 20, 2017 at 12:58 PM, Axb wrote:
> On 11/20/2017 06:26 PM, Alex wrote:
>>
>> Hi, we have an email that originated from email.dropbox.com and has a
>> link to https://hyzas.xss.ht/ which is a "payload to test for
>> Cross-site Scripting" from the XSS Hunter Team.
On 11/20/2017 06:26 PM, Alex wrote:
Hi, we have an email that originated from email.dropbox.com and has a
link to https://hyzas.xss.ht/ which is a "payload to test for
Cross-site Scripting" from the XSS Hunter Team.
Was it sent in error? How was it sent? I know what XSS is and how it
can be
Hi, we have an email that originated from email.dropbox.com and has a
link to https://hyzas.xss.ht/ which is a "payload to test for
Cross-site Scripting" from the XSS Hunter Team.
Was it sent in error? How was it sent? I know what XSS is and how it
can be used, but this was reported as malicious,