bug-bounty498
google355
xss301
microsoft298
facebook263
rce211
exploit200
malware171
apple164
cve136
account-takeover115
bragging-post102
privilege-escalation95
csrf90
phishing86
browser75
writeup74
authentication-bypass69
supply-chain68
dos66
stored-xss65
reflected-xss57
ssrf56
reverse-engineering55
react52
access-control51
input-validation49
cross-site-scripting48
aws47
cloudflare47
docker46
web-security46
lfi46
sql-injection45
smart-contract45
ethereum44
web-application44
web343
defi43
ctf43
oauth43
node43
pentest40
race-condition39
idor37
open-source37
cloud37
burp-suite36
info-disclosure36
auth-bypass35
0
5/10
bug-bounty
A reflected XSS vulnerability on Twitter's dev.twitter.com was discovered by exploiting inconsistent URL parsing between Location headers and href attributes in 302 redirects, combined with port manipulation and clickjacking to trigger execution. The payload leveraged a trailing slash and special characters to bypass Twitter's XSS filters, earning a $1,120 bounty.
xss
cross-site-scripting
url-parsing
http-redirect
302-redirect
location-header
clickjacking
payload-bypass
bug-bounty
bragging-post
Twitter
dev.twitter.com
Bywalks
bobrov