How I Found a P1 Bug in a Bug Bounty Program (Step-by-Step Guide)
This article details the discovery of an XSS vulnerability due to insufficient input validation and lack of Content Security Policy (CSP). The application accepted user input for a query parameter without proper sanitization, allowing script injection through the 'query' field. By injecting a JavaScript payload containing document.cookie manipulation code, the researcher was able to set and persist a PHPSESSID cookie on the victim's device. This payload was executed by the browser, creating a persistent session cookie that allowed an attacker to maintain unauthorized sessions and gain access to other users' accounts without needing their login credentials. The vulnerability paid out $1,000, and the organization addressed it by implementing strong input validation and setting appropriate CSP headers—never trust user-controlled data for security decisions. Key lesson: Validate inputs and enforce strict Content Security Policies to prevent XSS attacks. #BugBounty #XSS #CSP #InputValidation #Infosec

https://medium.com/@pradeeptadi03/how-i-found-a-p1-bug-in-a-bug-bounty-program-step-by-step-guide-7a3fb5ed60ac?source=rss------bug_bounty-5

🔥 How I Found a P1 Bug in a Bug Bounty Program (Step-by-Step Guide)

🔥 How I Found a P1 Bug in a Bug Bounty Program (Step-by-Step Guide) If you’re starting in bug bounty, you’ve probably asked yourself: “How do hackers actually find P1 bugs?” In this blog …

Medium

The Bouncer Who Never Checked IDs
This vulnerability was an XSS (Cross-Site Scripting) issue due to insufficient input validation and lack of Content Security Policy (CSP). The application accepted user input for a query parameter without proper sanitization, allowing script injection through the 'query' field. The researcher injected a payload containing JavaScript code that set a cookie named 'PHPSESSID', which is a unique session identifier in PHP applications. This payload was executed by the browser on the victim's device, creating a persistent session cookie. With this cookie, an attacker could maintain unauthorized sessions and gain access to other users' accounts without needing their login credentials. The vulnerability paid out $250, and the organization addressed it by implementing strong input validation and setting appropriate CSP headers—never trust user-controlled data for security decisions. Key lesson: Always validate inputs and enforce strict Content Security Policies. #BugBounty #XSS #CSP #InputValidation #Infosec

https://medium.com/@prodrx808/the-bouncer-who-never-checked-ids-2fc95942e990?source=rss------bug_bounty-5

The Bouncer Who Never Checked IDs

CVE-2026–29000 · pac4j-jwt · CVSS 10.0 Critical

Medium

@Kerplunk By way of comparison, Robin Milner, a great mathematician and computer scientist who died recently. He never completed his phud. The story he s#told me and many others is that in hols his manuscript blew into the water and he could not be arsed to do a rewrite

#csp #milner #concurrency

A little concept animation explaining the Reaper's weapon design.

#Art #DigitalArt #ConceptArt #WeaponDesign #ClipStudio #ClipStudioPaint #CSP #MastoArt #WeaponConceptArt

#Manga | Catboy Diarys

Da ich so schlau war beim #CSP Abo *nicht* nachzuschauen welche Version ich brauch, gibt es erstmal das was ich aufrufen kann - während ich mich mit dem Kundensupport prügeln werde. wuh

Ebenfalls werde ich den Monat, neben #DiDay und anderen kleinkram wie Arbeit, voll an die Basic Studys schmeißen.

⚠️ | Just be aware. Du supportest hier jemanden auf dem Bereich "Beginner"/"Anfänger" und damit meine ich nich die Internet Hi-Class variante davon.

https://www.patreon.com/posts/154125804

@SakutaV1 Nich mein Ziel euch Gay zu machen, aber wenn ihr euch dadurch aware fühlt. Stay Slay 💅 und sponsert mich mit 3€ damit ich mir #CSP weiter leisten kann ;^

Um den #DiDay treu zu bleiben.

Als Alternative zu #CSP könnt ihr zum Beispiel @kde #Krita nutzen (in ausnahme der @fdroidorg App, da der letzte Build dafür Jahre alt ist).

Und wenn ihr die Bilder archivieren wollt @nextcloud oder #Immich