Open Redirect Vulnerability on YouTube - Bug Bounty PoC | Professor Software Solutions

preview_player
Показать описание
Welcome to Professor Software Solutions! I am Professor the Hunter, your trusted partner in software development and ethical hacking. In this video, we will explore an Open Redirect vulnerability found on YouTube as part of Google’s Vulnerability Reward Program (VRP).

Join me as I present a detailed Proof of Concept (PoC) that demonstrates how this vulnerability can be exploited and the potential impacts it can have on user security. We’ll discuss best practices for identifying, reporting, and responsibly managing open redirect vulnerabilities in bug bounty programs.

This video offers a valuable opportunity to enhance your cybersecurity skills and deepen your understanding of web application security. Don’t miss out on essential insights that can elevate your bug hunting expertise!
Рекомендации по теме
Комментарии
Автор

I found it a year Ago, but this Said they know About it
Thanks beo

عبدالله-طظخ
Автор

Nice finding ...
Make video regarding API Testing, Sqli - Finding + Exploitation ..

CutiePieZer
Автор

Yes bhaiya I also found the same type of vulnerability in Facebook but I didn't report it thinking that they'll just ignore

rubayethassan
Автор

i like your way of hacking but i think this is not a valid open redirect because there is a confirmation before heading towards link.
did this got accepted?

hasskoelhadi
Автор

good find bro . This bug isn't fix ? i can also reproduce this bug

UCyohViaSVeHddrDZVKnoQ
Автор

Make video on paramspider how to use live

akashjamadar
Автор

did they accept it? beacuse it asks the victim are you sure you want to leave youtube before he redirect him to your website! this redirect thing on facebook and google it's the same ask the victim are you want to leave? i don't think they will accept it bro

eslammonex