Vulnerability Type: Cross Site Scripting (XSS)
  • Reported on 28 June 3013
  • Fixed Now

Sign into Google account and go to:

Now, Tick the box "I want to use Google Spreadsheet to store, edit and upload my feed" and Select 2nd option.

It will ask us to enter the URL, type "javascript:alert(1)" without quotes and type "Click Me" in Doc's Title field.

Click OK. Now click on "Click Me" and you will see a Pop-up due to XSS vulnerability.


I reported this vulnerability to Google and I received below reply:

Due to the requirement for the victim to take a few actions, the panel has determined this bug didn't meet the threshold for a reward. Nonetheless, we'd like to acknowledge your assistance on our credit page ( under "Honorable Mention" - are you interested? If so, what name/link should we list?
It should be of the form: name - site [site link] 
I re-edited my URL :

Now, the victim has to only tick the "I want to use Google" option and click on "Click Me"

To make it more easier, we could write something else in place of  "Click Me" like:

  • Session Timed Out! Click To Login Again
  • Click here to Sign in

I re-submitted  and received below reply from Google-
Thank you for the followup however the decision stands as is.
The vulnerability was fixed after few days.

Paypal- Privilege Escalation Vulnerability [Delete Any User]

Vulnerability Type: Privilege Escalation

Vulnerable Website:

Status: Fixed

Vulnerability Overview: This vulnerability allowed an attacker to delete any user registered in


I forgot to take screenshots but I am sure my detail write-up will clear everything.

Google Play - Cross Site Scripting (XSS) Vulnerability

Vulnerability Type: Cross Site Scripting (XSS)

  • Reported on 16 July 3013
  • Fixed on 17 July 2013


Google recently changed it's design of Google Play which lead to this XSS vulnerability.

Head to Google Play settings (