bug-bounty512
xss297
google214
rce180
microsoft174
facebook161
exploit143
account-takeover118
bragging-post117
malware112
cve102
apple102
privilege-escalation92
csrf88
authentication-bypass79
stored-xss75
open-source68
phishing67
writeup67
reflected-xss63
access-control62
web-security60
ai-agents59
ssrf55
browser53
input-validation52
dos50
reverse-engineering49
defi48
smart-contract48
cross-site-scripting48
sql-injection46
ethereum45
cloudflare43
lfi41
information-disclosure40
supply-chain39
api-security39
oauth39
react38
web337
race-condition37
web-application37
burp-suite36
tool35
ctf35
idor33
smart-contract-vulnerability33
pentest33
html-injection33
0
6/10
Researcher discovered a clickjacking vulnerability on Binary.com's ticktrade subdomain that lacked X-Frame-Options protection, then bypassed the initial JavaScript frame-busting patch by using HTML5 sandboxed iframes with permissive attributes (allow-scripts, allow-forms, allow-same-origin) to prevent top-level navigation while maintaining script execution.
clickjacking
html5
sandbox-bypass
iframe
x-frame-options
frame-busting
web-application-security
bug-bounty
Binary.com
Binary Ltd
ticktrade.binary.com
Ameer Assadi