<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: DOM XSS by Misusing Bootstrap</title>
	<atom:link href="http://www.exploresecurity.com/dom-xss-by-misusing-bootstrap/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.exploresecurity.com/dom-xss-by-misusing-bootstrap/</link>
	<description>IT security tools, techniques and commentary</description>
	<lastBuildDate>Sun, 07 Sep 2025 03:12:25 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
	<item>
		<title>By: 1</title>
		<link>http://www.exploresecurity.com/dom-xss-by-misusing-bootstrap/#comment-3130</link>
		<dc:creator>1</dc:creator>
		<pubDate>Wed, 10 Dec 2014 19:08:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=159#comment-3130</guid>
		<description><![CDATA[alert(&quot;this vulnerable?&quot;);]]></description>
		<content:encoded><![CDATA[<p>alert(&#8220;this vulnerable?&#8221;);</p>
]]></content:encoded>
	</item>
</channel>
</rss>
