XSS vulnerability in InternShala discovered via a JSON endpoint with incorrect text/html content-type header, exploited through multiple filter bypasses including whitespace replacement with +, confirm() instead of alert(), backticks for parentheses, and URL encoding for closing tags.
A reflected XSS vulnerability on Amazon's masclient endpoint (/gp/masclient/dp/) allows attackers to inject arbitrary HTML/JavaScript by exploiting insufficient input validation and capitalization of product IDs. The author demonstrates cookie theft and session hijacking via SVG onload attributes with HTML entity encoding to bypass browser XSS protections.
A reflected XSS vulnerability was discovered on Yahoo Finance's mobile version via the /quote/ endpoint. The attacker bypassed filters that converted lowercase characters to uppercase by using HTML entity encoding (e.g., a for 'a') to evade the case-sensitivity filter and successfully execute JavaScript.