bug-bounty450
google358
microsoft315
facebook265
xss239
apple181
malware172
rce149
exploit131
bragging-post101
cve99
account-takeover93
phishing82
csrf79
privilege-escalation77
stored-xss64
supply-chain64
authentication-bypass62
dos60
reflected-xss57
browser56
react50
cloudflare49
reverse-engineering48
input-validation48
cross-site-scripting47
access-control47
docker46
smart-contract45
node45
aws45
web344
ethereum43
sql-injection42
defi42
web-security40
ssrf40
web-application39
burp-suite35
idor34
vulnerability-disclosure34
info-disclosure34
race-condition33
cloud33
buffer-overflow33
html-injection33
smart-contract-vulnerability32
oauth32
writeup32
information-disclosure30
0
8/10
research
PortSwigger researchers discovered a practical XSS exploitation technique for hidden input fields using the accesskey attribute combined with onclick events, which works across modern browsers including Firefox and Chrome by triggering payload execution via keyboard shortcuts (ALT+SHIFT+X on Windows, CTRL+ALT+X on macOS).
xss
cross-site-scripting
hidden-input
accesskey-attribute
onclick-event
browser-exploitation
firefox
chrome
vulnerability-technique
web-security
input-validation
PortSwigger
Burp Suite
Gareth Heyes
Liam