bug-bounty448
google354
microsoft311
facebook262
xss238
apple179
malware174
rce149
exploit124
bragging-post101
cve99
account-takeover93
phishing83
csrf79
privilege-escalation77
supply-chain65
stored-xss65
authentication-bypass63
dos60
browser57
reflected-xss57
react50
cloudflare49
cross-site-scripting48
reverse-engineering48
input-validation48
access-control47
aws45
docker45
smart-contract45
node44
sql-injection43
ethereum43
web343
defi42
web-security42
web-application41
ssrf38
burp-suite35
idor34
vulnerability-disclosure34
info-disclosure33
race-condition33
html-injection33
cloud32
writeup32
oauth32
buffer-overflow32
smart-contract-vulnerability32
information-disclosure30
0
6/10
Security researcher discovered and bypassed a clickjacking vulnerability on Binary.com's ticktrade subdomain by exploiting HTML5 sandboxed iframes with specific permissions (allow-modals, allow-scripts, allow-forms, allow-popups, allow-same-origin) to circumvent JavaScript frame-busting defenses.
clickjacking
html5
sandbox-bypass
frame-busting-bypass
x-frame-options
iframe-attack
web-application-security
bug-bounty
Binary.com
Binary Ltd.
ticktrade.binary.com
Ameer Assadi