bug-bounty460
xss231
bragging-post117
rce87
microsoft82
google81
account-takeover81
open-source79
csrf77
authentication-bypass76
facebook75
stored-xss74
web-security64
reflected-xss63
access-control61
apple59
ai-agents59
privilege-escalation58
input-validation51
defi48
sql-injection48
cross-site-scripting47
smart-contract47
ethereum44
api-security42
information-disclosure41
web-application39
privacy39
tool37
ssrf36
burp-suite36
malware34
llm34
automation34
html-injection33
smart-contract-vulnerability33
vulnerability-disclosure33
web333
responsible-disclosure32
phishing32
opinion31
waf-bypass31
denial-of-service30
cve30
idor29
machine-learning29
code-generation28
authentication27
remote-code-execution26
infrastructure25
0
6/10
vulnerability
Authenticated XSS vulnerability in Ghost CMS API endpoint /ghost/api/v0.1/settings/ via PUT requests affecting logo, cover_image, ghost_head, and ghost_foot parameters. While requiring admin/owner privileges and limited by CORS/SOP in real-world scenarios, the vulnerability persists across multiple versions and was a rediscovery of a previously reported issue.
xss
cross-site-scripting
ghost-cms
api-security
put-request
authenticated-vulnerability
cors-bypass
input-validation
disclosure
Ghost
VoidSec
SANS Holiday Hack Challenge
KringleCon