Back to directory
WRITEUP #5035

How I paid 2$ for a 1054$ XSS bug + 20 chars blind XSS payloads

XSS
by@DaherMohamed4(Mohamed Daher)
Bounty
1,054
Program
-
Published
Nov 20, 2019
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://medium.com/@mohameddaher/how-i-paid-2-for-1054-xss-bug-20-chars-blind-xss-payloads-12d32760897b
RELATED WRITEUPS
Self-XSS to ATO via Site Features
XSSSelf-XSS
How 100% Manual Hacking (Without Even Kali And Burp) Led To 2 Medium Vulnerabilities On YesWeHack
XSS
Basic HTTP Authentication Risk: Uncovering pyspider Vulnerabilities
XSSReflected XSS
Bypassing CSP via URL Parser Confusions : XSS on Netlify’s Image CDN
XSSCSP bypass
A Story About How I Found XSS in ASUS
XSS

Built with ❤️ by Shubham Rawat