Persistent XSS In Verizon
Interesting scenario with generation of all possible HTMLs ( <footer onafterprint=“console.log(244599)” onbeforeprint=“console.log(309354)"[…] ), onwheel/oninput resulting in xss and clickjacking.
In the middle of the desert you can say anything you want