ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

222 results

TDiff
[FreeboxOS] [XSS] Unauthenticated XSS on local network

You can exploit XSS on the FreeboxOS admin interface from the freebox server SMB share if connected to the local network by ...

0:59
[FreeboxOS] [XSS] Unauthenticated XSS on local network

186 views

5 months ago

CYBERMED7
Learn About XSS Attacks: Reflected, Stored, and DOM-Based XSS | Cybersecurity Tutorial

Learn About XSS Attacks: Reflected, Stored, and DOM-Based XSS | Cybersecurity Tutorial #cybersecurity #coding #netwroking ...

15:17
Learn About XSS Attacks: Reflected, Stored, and DOM-Based XSS | Cybersecurity Tutorial

48 views

11 months ago

The Coding Gopher
Cross-Site Scripting (XSS) Explained

Check out SuperTokens here: https://supertokens.com/ ❤️ Get 40% OFF CodeCrafters: ...

10:19
Cross-Site Scripting (XSS) Explained

3,914 views

3 months ago

BlueSecc
Deface websaid with stored xss vulnerability, using kali linux

Welcome to [BlueSecc] Are you passionate about cybersecurity, ethical hacking, and vulnerability exploration? This channel is ...

12:05
Deface websaid with stored xss vulnerability, using kali linux

7,258 views

11 months ago

Cyber Cache
CVE-2015-4063: Cross-Site Scripting (XSS) Vulnerability in NewStatPress Plugin for WordPress

In this video, we dive deep into CVE-2015-4063, a Cross-Site Scripting (XSS) vulnerability discovered in the NewStatPress plugin ...

1:00
CVE-2015-4063: Cross-Site Scripting (XSS) Vulnerability in NewStatPress Plugin for WordPress

91 views

11 months ago

TDiff
[FreeboxOS][XSS] Torrent - content filename XSS exploit

Malicious filenames in torrents are prone to XSS by the web browser explorer of the FreeboxOS too.

0:30
[FreeboxOS][XSS] Torrent - content filename XSS exploit

175 views

5 months ago

Shield Forge InfoSec
Hack Websites with XSS? 🚨 Cross-Site Scripting Explained

Hackers can inject malicious scripts into your website to steal data, hijack sessions, or even deface your app! This video explains ...

7:39
Hack Websites with XSS? 🚨 Cross-Site Scripting Explained

196 views

11 months ago

Ziang Security
Broken Access Control

Broken Access Control is a common web application security vulnerability where users are able to access resources or perform ...

10:25
Broken Access Control

47 views

10 months ago

Enrico Masala
WA2025-L19: Cross-site scripting (XSS), fetch.

Course: Web Applications, Politecnico di Torino, a.y. 2024/2025.

1:24:31
WA2025-L19: Cross-site scripting (XSS), fetch.

159 views

9 months ago

Cooper
Practical Self-XSS Exploitation and Novel Attacks with Cookie Tossing - Thomas Houhou

... is arbitrary JavaScript code execution So you can think about just XSS um to achieve it And so there are two ways to get cookie ...

36:44
Practical Self-XSS Exploitation and Novel Attacks with Cookie Tossing - Thomas Houhou

60 views

1 month ago

Peter Schneider
Security: Is XSS through style attribute possible in modern browsers?

Is XSS through style attribute possible in modern browsers? I hope you found a solution that worked for you :) The Content is ...

3:36
Security: Is XSS through style attribute possible in modern browsers?

2 views

8 months ago

Enrico Masala
WA-2025-L20: Modules. Example of XSS.

Course: Web Applications, Politecnico di Torino, a.y. 2024/2025.

1:00:44
WA-2025-L20: Modules. Example of XSS.

157 views

9 months ago

Reverse Everything
PWNORDIE 2025 - Content Security Policy ¿El fin de XSS? - Santos Gallegos

En esta charla, nos sumergiremos en las complejidades de Content Security Policy (CSP) y los desafíos que enfrentan los ...

30:49
PWNORDIE 2025 - Content Security Policy ¿El fin de XSS? - Santos Gallegos

74 views

4 months ago

BSides Budapest IT Security Conference
Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025

Bálint Magyar - Bug Bounty Year 1: $0–16k, Low to CVE This presentation was held at #BSidesBUD2025 IT security conference ...

40:23
Bug Bounty Year 1: $0–16k, Low to CVE #BSidesBUD2025

966 views

7 months ago

Luigi Gubello
Remote Code Execution in Logseq Desktop

A critical vulnerability chain in Logseq Desktop allows remote code execution (RCE) via a malicious PDF. An outdated version of ...

0:12
Remote Code Execution in Logseq Desktop

152 views

5 months ago

BlueSecc
Hunting xss and lfi using nuclei & shodan

Welcome to [ph3lixxx] Are you passionate about cybersecurity, ethical hacking, and vulnerability exploration? This channel is ...

16:57
Hunting xss and lfi using nuclei & shodan

254 views

5 months ago

Peter Schneider
Security: Is there a way to exploit this DOM-based XSS in recent versions of browsers?

Is there a way to exploit this DOM-based XSS in recent versions of browsers? I hope you found a solution that worked for you ...

1:49
Security: Is there a way to exploit this DOM-based XSS in recent versions of browsers?

0 views

2 months ago

tomek7667
EZMD Unintended Solution: DOMPurify Bypass to Puppeteer Escape - 0CTF 2025

Bypassing DOMPurify via replacement patterns and chaining a Puppeteer escape to leak the flag in the ezmd challenge.

11:01
EZMD Unintended Solution: DOMPurify Bypass to Puppeteer Escape - 0CTF 2025

136 views

2 weeks ago

The Debug Zone
How to Add Nonce Attribute to Auto-Generated WebForms Script for Security

In today's digital landscape, ensuring the security of web applications is more crucial than ever. One effective way to enhance ...

2:19
How to Add Nonce Attribute to Auto-Generated WebForms Script for Security

33 views

10 months ago

Gnar Coding
Only 1 of These 100 Inputs Is Evil…

DISCLAIMER: Everything in this video is for EDUCATIONAL and entertainment purposes ONLY Discord: ...

21:18
Only 1 of These 100 Inputs Is Evil…

452 views

3 months ago