Reflected XSS in meraki.cisco.com
I have tried a few times, but finally managed to execute JavaScript code in meraki.com
I have tried a few times, but finally managed to execute JavaScript code in meraki.com
It is an old self reflected XSS (April 6th, 2013), but it was a nice hunt for the beginning of my career.
Copy.com is a Barracuda Networks file sharing service, which offers 15GB of a free cloud storage for your files.
I have started my bug bounty adventure with Yandex – a company which owns the largest search engine in Russia.
The first place where I started looking for a JavaScript code injection on ebay.com was a search box. Surprisingly, it was a bull’s eye.
Simple reflected XSS bug in Avans’ search box: