bug-bounty512
xss298
google224
rce189
microsoft181
facebook170
exploit154
malware126
account-takeover119
bragging-post117
cve110
apple107
privilege-escalation94
csrf89
authentication-bypass79
stored-xss75
phishing71
open-source68
writeup68
reflected-xss63
access-control62
web-security60
ai-agents59
browser56
ssrf55
input-validation52
dos52
reverse-engineering51
smart-contract48
defi48
cross-site-scripting48
supply-chain46
sql-injection46
ethereum45
cloudflare44
lfi41
information-disclosure40
oauth40
api-security39
race-condition38
web338
react38
web-application37
burp-suite36
ctf36
tool35
pentest35
smart-contract-vulnerability33
idor33
html-injection33
0
6/10
vulnerability
A clickjacking vulnerability in Telegram's web client allowed attackers to bypass frame-busting protections using sandboxed iframes and block CSS stylesheets via MITM attacks, enabling account compromise and unauthorized message sending. The vulnerability was fixed by Telegram implementing proper X-Frame-Options headers.
clickjacking
web-application
frame-busting-bypass
csrf
telegram
x-frame-options
sandboxed-iframe
html5
client-side-security
account-takeover
Telegram
Mohamed A. Baset
Seekurity
Pavel Durov