bug-bounty460
xss231
bragging-post117
rce87
microsoft82
google81
account-takeover81
open-source79
csrf77
authentication-bypass76
facebook75
stored-xss74
web-security64
reflected-xss63
access-control61
apple59
ai-agents59
privilege-escalation58
input-validation51
defi48
sql-injection48
cross-site-scripting47
smart-contract47
ethereum44
api-security42
information-disclosure41
web-application39
privacy39
tool37
ssrf36
burp-suite36
malware34
llm34
automation34
html-injection33
smart-contract-vulnerability33
vulnerability-disclosure33
web333
responsible-disclosure32
phishing32
opinion31
waf-bypass31
denial-of-service30
cve30
idor29
machine-learning29
code-generation28
authentication27
remote-code-execution26
infrastructure25
0
6/10
bug-bounty
A stored XSS vulnerability was discovered in Zendesk's macro feature by exploiting the macro description field, coupled with a WAF bypass technique that involves submitting benign content initially and injecting the payload during subsequent edits when WAF validation is less stringent.
Zendesk
Hariharan S
P5YCH0
0
5/10
vulnerability
A researcher demonstrates chaining a CSRF vulnerability with a stored XSS flaw to achieve persistent XSS execution. By exploiting a missing CSRF token on a template creation endpoint and leveraging an HTML/SVG injection point in a description field, an attacker can create a malicious template that executes JavaScript when viewed by any user.
csrf
stored-xss
xss-vulnerability
web-security
vulnerability-chaining
html-injection
svg-payload
bug-bounty
Mohamed Sayed