Real world report PoCs
You can read these real world XSS PoCs to better understand how the bug is exploited in the real world scenarios
How I found a $5,000 Google Maps XSS (by fiddling with Protobuf) by Marin MoulinierFollow
XSS in Uber via Cookie by zhchbin
XSS in TinyMCE 2.4.0 by Jelmer de Hen
Twitter XSS by stopping redirection and javascript scheme by Sergey Bobrov
Flash XSS mega nz – by frans
Flash XSS in multiple libraries – by Olivier Beg
xss in Yahoo Mail Again, worth $10000 by Klikki Oy
Sleeping XSS in Google by securityguard
Decoding a .htpasswd to earn a payload of money by securityguard
Sleeping stored Google XSS Awakens a $5000 Bounty by Patrik Fehrenbach
RPO that lead to information leakage in Google by filedescriptor
God-like XSS, Log-in, Log-out, Log-in in Uber by Jack Whitton
Three Stored XSS in Facebook by Nirgoldshlager
Using a Braun Shaver to Bypass XSS Audit and WAF by Frans Rosen
An XSS on Facebook via PNGs & Wonky Content Types by Jack Whitton
he is able to make stored XSS from a irrelevant domain to main facebook domain
Stored XSS in *.ebay.com by Jack Whitton
Complicated, Best Report of Google XSS by Ramzes
Command Injection in Google Console by Venkat S
Facebook’s Moves – OAuth XSS by PAULOS YIBELO
Stored XSS in Google Docs (Bug Bounty) by Harry M Gertos
Stored XSS on developer.uber.com via admin account compromise in Uber by James Kettle (albinowax)
Yahoo Mail stored XSS by Klikki Oy
Abusing XSS Filter: One ^ leads to XSS(CVE-2016-3212) by Masato Kinugawa
Youtube XSS by fransrosen
Best Google XSS again – by Krzysztof Kotowicz
IE & Edge URL parsin Problem – by detectify
Reference: https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/
Last updated