Reflected XSS Leads to 3,000$ Bug Bounty Rewards from Microsoft Forms
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Javascript - T1059.007 Malicious Link - T1204.001 Phishing - T1660 Phishing - T1566 Tool - T1588.002 Vulnerabilities - T1588.006 Scripting - T1064 Scripting |
Common Information
Type | Value |
---|---|
UUID | fd42bc37-0da6-4594-97fa-3d98c2f47aea |
Fingerprint | ac033b81fb7fdbc9 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Jan. 22, 2023, 6:21 p.m. |
Added to db | Jan. 23, 2023, 7:57 p.m. |
Last updated | Dec. 23, 2024, 3:13 p.m. |
Headline | Reflected XSS Leads to 3,000$ Bug Bounty Rewards from Microsoft Forms |
Title | Reflected XSS Leads to 3,000$ Bug Bounty Rewards from Microsoft Forms |
Detected Hints/Tags/Attributes | 27/2/5 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 136 | ✔ | InfoSec Write-ups - Medium | https://infosecwriteups.com/feed | 2024-08-30 22:08 |
Details | 164 | ✔ | — | https://media.cert.europa.eu/rss?type=category&id=SocialEngineering&language=en&duplicates=false | 2024-08-30 22:08 |