The vulnerability in the Undici library involves the use of an unsafe random function to choose the boundary for a multipart/form-data request. The use of Math.random() to generate this boundary can b ...
Continue ReadingJanuary 27, 2025
The HackerOne email change process was found to have a vulnerability where the system automatically verifies the email address if the verification link is opened in any browser, even by email scanning ...
Continue ReadingJanuary 27, 2025
Vulnerability description not...Read More ...
Continue ReadingJanuary 27, 2025
Vulnerability description not...Read More ...
Continue ReadingJanuary 27, 2025
The security researcher found a reflected cross-site scripting (XSS) vulnerability on the www.████████.mil website. The vulnerability was demonstrated using a proof-of-concept link tha ...
Continue ReadingJanuary 27, 2025
The aws-lambda-ecs-run-task application created a function with a role that had excessive permissions, including the AdministratorAccess policy. This allowed for potential privilege escalation by an.. ...
Continue ReadingJanuary 27, 2025
The Capabilites implementation in CosmWasm contracts was found to have a vulnerability. Even if the executing chain did not allow a specific capability, a CosmWasm contract could still execute actions ...
Continue ReadingJanuary 27, 2025
Vulnerability description not...Read More ...
Continue ReadingJanuary 27, 2025
Back to Main