bug-bounty480
google297
xss277
microsoft249
facebook211
rce159
apple150
exploit136
bragging-post102
account-takeover98
malware94
csrf84
cve79
privilege-escalation74
authentication-bypass65
stored-xss65
writeup61
reflected-xss57
browser54
react53
ssrf51
phishing50
dos50
input-validation49
cloudflare49
access-control49
cross-site-scripting48
node46
aws46
smart-contract45
docker45
sql-injection45
ethereum44
defi43
web-security43
web-application42
supply-chain42
oauth41
web339
burp-suite36
lfi34
vulnerability-disclosure34
idor34
html-injection33
smart-contract-vulnerability32
race-condition32
clickjacking31
reverse-engineering31
information-disclosure30
csp-bypass30
0
7/10
bug-bounty
A persistent XSS vulnerability was discovered in AH.nl's avatar upload feature where user input was not properly sanitized, allowing attackers to inject malicious JavaScript that would execute for all site visitors viewing the attacker's profile. The exploit bypassed firewall filters using obfuscation techniques like 'onerroronerror==' and leveraged jQuery's getScript() to load external malicious code for cookie theft and phishing attacks.
persistent-xss
stored-xss
xss
input-validation
payload-bypass
burp-suite
cookie-theft
phishing
avatar-injection
html-injection
firewall-bypass
regex-bypass
onerror-handler
jquery-exploitation
bug-bounty-writeup
AH.nl
Albert Heijn
Kookschrift
Jonathan Bouman
Burp Suite
BeEF Project
jQuery
0
6/10
Researcher bypassed a WAF filtering angle brackets by inserting dummy tags (e.g., <x>) to obfuscate XSS payloads, then exploited reflected XSS to steal user credit card data via jQuery GET/POST requests to exfiltrate payment details pages.
xss
waf-bypass
input-validation
credit-card-theft
bug-bounty
payload-obfuscation
jquery-exploitation
reflected-xss
Osama Avvan
Bugcrowd
Redact.com