WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

209

(post is archived)

[–] 0 pt 4y (edited 4y)

How is it processing the input data then? This is the type of shit zerodays are made from. You should block emedded bitchute links until this is resolved.

[–] 0 pt 4y

lol Go learn how iframes work.

Nothing is loaded on poal side.

The expando is opening an iframe with the bitchute url into the embed format. Nothing more. The player is loaded from bitchute.

[–] 0 pt 4y (edited 4y)

I understand its loaded from bitchute, but the unresolved and randomly activated input function is likely a vulnerability. You should block embedded or expando bitchute links until it is resolved.

[–] 0 pt 4y

Every single link on the internet is a potential vulnerability.