BugCrowd Bug Bounty Disclosure: P2 – Blind stored XSS on from https://talent.indeed.com to http://auscorp-analyticstest1.indeed.net:8012/notebooks/8221 – By bigBugGuy
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct at the time of posting.
Program
Program Information

indeed
Details
Additional Information
- Priority: P2
I plan on making a video on blind XSS. I’d like to include a few real world examples. Among those included will be an example that features Google, a company that has given me permission to include. I’d like to include this submission as well.
Submitted By
Submitter Information
- Hacker Points: 537
- Hacker Accuracy: 100.0%
- Hacker Rank: 576th
bigBugGuy