bug-bounty531
xss284
rce163
bragging-post120
google112
exploit103
account-takeover100
open-source91
microsoft82
privilege-escalation79
csrf78
cve76
authentication-bypass75
stored-xss72
facebook72
malware69
access-control65
ai-agents63
reflected-xss61
writeup57
web-security53
ssrf53
input-validation53
sql-injection49
cross-site-scripting48
phishing47
tool46
smart-contract46
defi45
ethereum45
privacy44
web-application43
cloudflare41
apple40
information-disclosure39
web338
dos38
responsible-disclosure37
llm37
lfi36
browser36
api-security35
burp-suite35
opinion35
automation34
oauth34
reverse-engineering34
vulnerability-disclosure34
machine-learning32
code-generation31
0
7/10
bug-bounty
A stored XSS vulnerability in EspoCRM 5.6.8's email signature feature allowed attackers to steal authentication cookies via a polyglot XSS payload, enabling complete account takeover of any user including administrators. The vulnerability exploited inadequate input sanitization in the markdown code-view feature and lack of HttpOnly flags on session cookies.
stored-xss
account-takeover
cookie-theft
authentication-bypass
httponly-bypass
markdown-injection
html-injection
polyglot-xss
espocrm
bug-bounty
cve-2019-14546
CVE-2019-14546
EspoCRM
EspoCRM 5.6.8
Gaurav Narwani
Somdev Sangwan