bug-bounty451
google354
xss338
microsoft283
facebook246
apple171
exploit163
rce160
malware102
account-takeover95
cve91
bragging-post86
csrf83
browser77
writeup75
privilege-escalation68
react60
authentication-bypass57
cloudflare54
dos53
node52
docker51
ssrf51
phishing50
aws48
access-control47
oauth45
smart-contract45
supply-chain44
ethereum43
defi42
web342
sql-injection41
lfi37
idor35
vulnerability-disclosure32
smart-contract-vulnerability32
clickjacking31
burp-suite31
info-disclosure31
race-condition31
web-application31
reverse-engineering31
wordpress30
input-validation30
web-security29
information-disclosure29
cloud29
reflected-xss29
solidity27
0
7/10
bug-bounty
A site-wide CSRF vulnerability was discovered on a popular program where the backend accepted form-encoded payloads (application/x-www-form-urlencoded) despite expecting JSON, because the server failed to strictly validate the Content-Type header. The attacker bypassed the false assumption that JSON-only handling would prevent CSRF by sending traditional form-based CSRF payloads.
csrf
content-type-validation
json-parsing
broken-access-control
bug-bounty
web-security
api-security
Ajinkya Pathare