bug-bounty497
google318
xss300
microsoft262
facebook230
rce194
exploit166
apple155
malware144
cve131
account-takeover113
bragging-post110
privilege-escalation88
csrf86
authentication-bypass71
stored-xss66
writeup62
phishing62
browser59
reflected-xss59
dos59
supply-chain57
access-control52
reverse-engineering50
input-validation49
web-security49
react49
cloudflare48
defi48
ssrf48
smart-contract47
cross-site-scripting46
open-source46
oauth44
ethereum44
sql-injection43
lfi43
aws41
web340
node39
docker38
web-application38
race-condition37
ctf37
api-security36
burp-suite36
ai-agents35
pentest35
info-disclosure35
buffer-overflow33
0
6/10
bug-bounty
A researcher exploited CORS misconfiguration combined with XSS on a subdomain to exfiltrate sensitive user data (email, age, gender, DOB) from a main domain endpoint. By crafting an XSS payload that sends a credentialed XMLHttpRequest to the misconfigured endpoint and exfiltrates the response, the attacker could steal protected user information.
cors-misconfiguration
xss
cross-site-scripting
xmlhttprequest
subdomain-origin
bug-bounty
data-exfiltration
reflected-xss
web-security
client-side-attack
Noman Shaikh
Netgear
Bugcrowd
James Kettle
Daniel Bakker
Kaushal Parikh