bug-bounty480
google300
xss277
microsoft250
facebook213
rce160
apple150
exploit137
bragging-post102
account-takeover98
malware94
csrf84
cve80
privilege-escalation75
stored-xss65
authentication-bypass64
writeup61
reflected-xss57
browser55
react54
cloudflare51
ssrf51
dos50
phishing50
access-control49
input-validation48
cross-site-scripting48
node47
docker46
aws46
smart-contract45
sql-injection45
ethereum44
supply-chain44
defi43
web-security43
web-application41
oauth41
web339
burp-suite36
lfi35
vulnerability-disclosure34
idor34
html-injection33
race-condition32
smart-contract-vulnerability32
clickjacking31
reverse-engineering31
information-disclosure30
csp-bypass30
0
7/10
A researcher chained two XSSi (Cross-Site Script Inclusion) vulnerabilities at Yahoo to steal user account information by extracting a valid crumb token from a dynamic JavaScript file and using it in a JSONP endpoint request, earning a $750 bounty.
xssi
cross-site-script-inclusion
jsonp
same-origin-policy
information-disclosure
credential-theft
yahoo
bug-bounty
web-vulnerability
javascript
Yahoo
Burp Suite
JSONP
https://messenger.yahoo.com/embed/app.js
https://jsapi.login.yahoo.com/w/device_users
0
9/10
vulnerability
A researcher discovered a stored XSS vulnerability in Twitter that could be weaponized as a self-propagating worm by exploiting flawed HTML tag stripping in the Welcome Message deeplink feature, combined with a JSONP endpoint vulnerability on a whitelisted subdomain to bypass the CSP policy. The attack chained multiple input validation bypasses and DOM manipulation techniques to achieve arbitrary JavaScript execution.
stored-xss
xss-worm
twitter
csp-bypass
input-validation-bypass
html-tag-stripping
jsonp
twitter-cards
dom-based-xss
vulnerability-chaining
Twitter
Virtue Security
CVE (not specified in article)