xss-bypass

5 articles
sort: new top best
clear filter
0 5/10

A bug bounty hunter describes finding 5 stored XSS vulnerabilities on a private program worth $1,016.66 each, including techniques for bypassing input filters through payload placement, encoding variations (<), file upload abuse (.xhtml), and filter evasion by targeting unsanitized HTML in notifications.

Burp Suite Censys Shodan
cybristerboy.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 3/10

Researcher bypassed XSS protection filters using an iframe payload with data URI encoding to achieve stored XSS in a comment box, earning a $150 bounty within 30 minutes. The payload exploited the target's allowlisting of iframe tags while blocking standard script injection vectors.

Yeasir Arafat Shawar Khan
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 5/10

Researcher discovered a reflected XSS vulnerability on Amazon's ad system domain (ws-na.amazon-adsystem.com) via the tracking_id parameter, then bypassed Amazon's initial fix using an alternative payload technique.

Amazon ws-na.amazon-adsystem.com newp_th
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 6/10

A stored XSS vulnerability bypassed input filters by injecting malicious HTML attributes into an input field. The attacker circumvented tag filtering and character encoding by using OnMouseOver event handlers with backtick-quoted function calls to execute JavaScript via user interaction.

Prial Islam Khan
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details
0 5/10

A researcher discovered stored XSS vulnerability in a file upload feature restricted to CSV files by bypassing server-side XSS filters using a polyglot payload combining HTML/SVG tags and event handlers.

HackerOne Gujjuboy10x00
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details