woto.net Cross Site Scripting vulnerability OBB-3533314

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...

Continue Reading
getblue.io Cross Site Scripting vulnerability OBB-3533319

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
avasus.ufrn.br Cross Site Scripting vulnerability OBB-3533476

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
answerbasewp.azurewebsites.net Cross Site Scripting vulnerability OBB-3533478

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
coraltechsurvey.com Cross Site Scripting vulnerability OBB-3533482

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
cicopar.com.ar Cross Site Scripting vulnerability OBB-3533489

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
FreeBSD : chromium — multiple vulnerabilities (2f22927f-26ea-11ee-8290-a8a1599412c6)

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 2f22927f-26ea-11ee-8290-a8a1599412c6 advisor ...

Continue Reading
CVE-2023-31461

Attackers can exploit an open API listener on SteelSeries GG 36.0.0 to create a sub-application that will be executed automatically from a controlled location, because of a path traversal vulnerabilit ...

Continue Reading

Back to Main

Subscribe for the latest news: