bug-bounty449
google357
microsoft315
facebook267
xss239
apple181
malware175
rce149
exploit128
bragging-post101
cve100
account-takeover93
phishing83
csrf79
privilege-escalation77
stored-xss65
supply-chain65
authentication-bypass62
dos60
browser59
reflected-xss57
react51
cloudflare49
reverse-engineering48
cross-site-scripting48
input-validation48
access-control47
docker46
smart-contract45
node45
aws45
web343
ethereum43
defi42
sql-injection42
web-application41
web-security40
ssrf38
burp-suite35
vulnerability-disclosure34
info-disclosure34
idor34
race-condition33
buffer-overflow33
cloud33
html-injection33
writeup32
oauth32
smart-contract-vulnerability32
pentest30
0
8/10
vulnerability
XSS vulnerability in a conference application (likely Zoom or similar) that chains to RCE via Node.js process execution in the native OS X client. The exploit uses String.fromCharCode to bypass quote filtering and jQuery's $.getScript() to fetch and execute remote code that spawns arbitrary processes.
xss
rce
remote-code-execution
nodejs
process-execution
string-filtering-bypass
jquery-gadget
native-app-vulnerability
unauthenticated-access
meeting-platform
payload-crafting
ActBlue
RSnake
patrick
ben
greg
GitHub
Node
jQuery
String.fromCharCode
process.open
xor.cc