bug-bounty448
google356
microsoft314
facebook263
xss238
apple180
malware174
rce149
exploit127
bragging-post101
cve99
account-takeover93
phishing83
csrf79
privilege-escalation77
stored-xss65
supply-chain65
authentication-bypass63
dos60
reflected-xss57
browser57
react50
cloudflare49
input-validation48
cross-site-scripting48
reverse-engineering48
access-control47
aws45
docker45
smart-contract45
node44
web343
ethereum43
sql-injection43
web-security42
defi42
web-application41
ssrf38
burp-suite35
vulnerability-disclosure34
idor34
race-condition33
info-disclosure33
buffer-overflow33
html-injection33
oauth32
writeup32
cloud32
smart-contract-vulnerability32
information-disclosure30
0
6/10
vulnerability
A reflected/stored XSS vulnerability in Ghost CMS's /ghost/api/v0.1/settings/ API endpoint affecting logo, cover_image, ghost_head, and ghost_foot parameters. While requiring authenticated admin/owner access, the vulnerability persists across multiple versions (1.24.9 through at least 2.2.0) and executes payloads on every page of the website.
xss
cross-site-scripting
ghost-blog
api-security
put-request
authenticated-vulnerability
cors-bypass
vulnerability-disclosure
content-management-system
Ghost
VoidSec
CORS Anywhere
CVE (referenced but not specified)