https://www.paypal.com/uk/webapps/mpp/account-selection

Submitted URL:
https://www.paypal.com/uk/webapps/mpp/account-selection
Report Finished:
Copy link

The outgoing links identified from the page

LinkText
https://developer.paypal.com/homeDevelopers
https://developer.paypal.com/homeDeveloper Documentation Developer Documentation
https://developer.paypal.com/?_ga=2.192417769.238788070.1689001362-735340911.1681920501DeveloperDeveloper
https://www.joinhoney.com/exploreShop
https://www.paypalobjects.com/marketing/web/uk/en/footer/FY-2023-PayPal-Joint-MSS-FINAL.pdfModern Slavery Statement
https://newsroom.uk.paypal-corp.com/Newsroom
https://careers.pypl.com/home/Jobs

JavaScript Variables · 32 found

Copy link

Global JavaScript variables loaded on the window object of a page, are variables declared outside of functions and accessible from anywhere in the code within the current scope

NameType
0object
onbeforetoggleobject
documentPictureInPictureobject
onscrollendobject
antiClickjackobject
DD_RUMobject
paypalADSInterceptorInjectedboolean
__GLOBAL_NAV_CONTEXT_HEADER__object
__GLOBAL_NAV_CONTEXT_FOOTER__object
regeneratorRuntimeobject

Console log messages · 4 found

Copy link

Messages logged to the web console

LevelSourceMessage
logother
Text
%c WARNING!!! color:#FF8F1C; font-size:40px;
logother
Text
%c This browser feature is for developers only. Please do not copy-paste any code or run any scripts here. It may cause your PayPal account to be compromised. color:#003087; font-size:16px; font-weight: bold;
logother
Text
%c For more information, http://en.wikipedia.org/wiki/Self-XSS color:#003087; font-size:16px; font-weight: bold;
warningother
URL
https://www.paypal.com/auth/recaptcha/grcenterprise_v3.html
Text
An iframe which has both allow-scripts and allow-same-origin for its sandbox attribute can escape its sandboxing.

The raw HTML body of the page