bug-bounty528
xss284
rce158
google121
bragging-post120
exploit100
account-takeover99
open-source91
microsoft87
csrf78
facebook78
privilege-escalation76
authentication-bypass75
cve72
stored-xss72
malware68
access-control65
ai-agents63
reflected-xss61
writeup56
ssrf53
input-validation53
web-security53
sql-injection49
cross-site-scripting48
smart-contract46
tool46
defi45
ethereum45
privacy44
web-application43
apple43
phishing42
cloudflare41
browser40
information-disclosure39
dos38
web337
llm37
responsible-disclosure37
lfi36
burp-suite35
opinion35
api-security35
oauth34
automation34
vulnerability-disclosure34
reverse-engineering34
idor32
machine-learning32
0
7/10
bug-bounty
A stored XSS vulnerability in EspoCRM 5.6.8's email signature feature allowed attackers to steal authentication cookies via a polyglot XSS payload, enabling complete account takeover of any user including administrators. The vulnerability exploited inadequate input sanitization in the markdown code-view feature and lack of HttpOnly flags on session cookies.
stored-xss
account-takeover
cookie-theft
authentication-bypass
httponly-bypass
markdown-injection
html-injection
polyglot-xss
espocrm
bug-bounty
cve-2019-14546
CVE-2019-14546
EspoCRM
EspoCRM 5.6.8
Gaurav Narwani
Somdev Sangwan