bug-bounty480
google298
xss277
microsoft249
facebook211
rce159
apple150
exploit136
bragging-post102
account-takeover98
malware94
csrf84
cve79
privilege-escalation74
stored-xss65
authentication-bypass65
writeup61
reflected-xss57
browser54
react53
ssrf51
phishing50
cloudflare50
dos50
access-control49
input-validation49
cross-site-scripting48
node47
aws46
smart-contract45
docker45
sql-injection45
ethereum44
defi43
web-security43
web-application42
supply-chain42
oauth41
web339
burp-suite36
vulnerability-disclosure34
lfi34
idor34
html-injection33
smart-contract-vulnerability32
race-condition32
reverse-engineering31
clickjacking31
csp-bypass30
information-disclosure30
0
6/10
vulnerability
Three XSS vulnerabilities discovered in ProtonMail for iOS: one via SVG onload in applewebdata origin, one via javascript URI requiring click interaction, and one via base64-encoded HTML embed in data origin. While XSSs do not allow email exfiltration, they enable JavaScript execution, privacy violations through tracking, phishing, and UXSS in privileged contexts.
xss
cross-site-scripting
protonmail
ios
dompurify
vulnerability-disclosure
email-security
webkit
applewebdata
uxss
payload-analysis
ProtonMail
Vladimir Metnew
DOMPurify
Cure53
CVE-2016-1764
Anatoly
Andy Yen
Safiler
0
7/10
vulnerability
A DOM-based XSS vulnerability was discovered in Google's /ajax/pi/fbfr endpoint where the location hash was directly used as a form action without validation, allowing javascript: protocol execution. The vulnerability was fixed by adding a check to ensure the hash begins with 'http' before using it as the form action.
xss
cross-site-scripting
dom-xss
vulnerability-research
acunetix
google
location-hash
open-redirect
payload-analysis
vulnerability-scanner
bug-bounty
Google
Acunetix
Andrey Leonov
Link
google.ws
google.com