bug-bounty480
google297
xss277
microsoft249
facebook211
rce159
apple150
exploit136
bragging-post102
account-takeover98
malware94
csrf84
cve79
privilege-escalation74
authentication-bypass65
stored-xss65
writeup61
reflected-xss57
browser54
react53
ssrf51
phishing50
dos50
input-validation49
cloudflare49
access-control49
cross-site-scripting48
node46
aws46
smart-contract45
docker45
sql-injection45
ethereum44
defi43
web-security43
web-application42
supply-chain42
oauth41
web339
burp-suite36
lfi34
vulnerability-disclosure34
idor34
html-injection33
smart-contract-vulnerability32
race-condition32
clickjacking31
reverse-engineering31
information-disclosure30
csp-bypass30
0
7/10
bug-bounty
A bug bounty researcher discovered a technique to escalate a self-XSS vulnerability into a reflected XSS by encoding the malicious payload as a QR code, which bypassed client-side filtering and allowed automatic payload execution when scanned by victims without additional user interaction.
HackerOne
Hein Thant Zin
0
7/10
vulnerability
Firefox iOS QR code scanner fails to sanitize javascript: URIs, allowing XSS attacks across multiple contexts including reader mode, local files, and internal pages, while also bypassing Content Security Policy restrictions. The vulnerability was fixed by removing javascript URI support from the address bar in later versions.
xss
cve-2019-17003
qr-code
javascript-uri
firefox-ios
webkit
reader-mode
csp-bypass
local-file-access
internal-pages
mobile-browser
CVE-2019-17003
Firefox iOS
Opera Mini
WebKit
Mozilla