ajax-bypass

1 article
sort: new top best
clear filter
0 6/10

A researcher discovered a reflected XSS vulnerability in a dynamically generated JavaScript file endpoint that accepted unsanitized user input via a 'cb' parameter, allowing arbitrary JavaScript execution through JSONP-style callback injection combined with missing X-Content-Type-Sniffing headers.

Arbaz Hussain parameth
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 12 hours ago · details