Jump to content
dancezar

Yahoo.net Full Path Discloure + XSS + Posible Sql injection

Recommended Posts

  • Active Members
Posted (edited)

Target: .yahoo.net

Exploit #1 Full path discloure:

http://s21.postimg.org/op7ug87tj/fpd.png

Exploit #2 Cross site scripting POST

http://s30.postimg.org/6qj3jcahc/yahoo.jpg

Exploit #3 Sql injection (True and false)

True:View image: true

False:http://s15.postimg.org/trvc34vwb/false.png

Toate in acelasi subdomeniu.Ps: daca cautati putin s-ar putea sa il gasiti ;)

--Vurnerabilitati Raportate

Edited by danyweb09
  • Active Members
Posted (edited)
Va vor spune ca nu sunt in scope:)

Nu sunt in scope pentru bani dar am raportat un fpd intr-un .net si am primit HOF

//se ofera bani doar pentru vurnerabilitati grave in .net

Edited by danyweb09
Posted

Si eu am primit pentru un SQLi:


[FONT=arial]Hi X,[/FONT]

[FONT=arial]At the time of the report we had not completed the details around the bug bounty program. The program scope covers [/FONT][URL="http://yahoo.com/"]yahoo.com[/URL][FONT=arial] and [/FONT][URL="http://flickr.com/"]flickr.com[/URL][FONT=arial] along with the respective mobile and client side apps. ([/FONT][url=http://bugbounty.yahoo.com/]Yahoo - Bug Bounty Program Rules[/url][FONT=arial])[/FONT]

[FONT=arial]The bug on [/FONT][URL="http://yahoo.net/"]yahoo.net[/URL][FONT=arial] was found to be out of scope. We have listed you as a contributor on the Wall of Fame to show our appreciation.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...