Why? Because the second link from the container is the retweet link – it then clicks this link.
![tweetdeck emojis tweetdeck emojis](https://emojipedia-us.s3.dualstack.us-west-1.amazonaws.com/thumbs/144/twitter/282/face-with-thermometer_1f912.png)
The script tag is identified with the class xss so it can be referenced later. The tweet starts by opening an inline script tag.
![tweetdeck emojis tweetdeck emojis](https://emojipedia-us.s3.dualstack.us-west-1.amazonaws.com/thumbs/144/twitter/282/cat-with-wry-smile_1f63c.png)
On Wednesday, the user exploited a stored XSS (cross-site scripting) vulnerability in the TweetDeck application and created a worm that affected 82,138 Twitter users and forced them to retweet a particular message. The application was acquired by Twitter on May 25, 2011. TweetDeck is a very popular Twitter application (with 23% market share as of June 2009).