An authentication bypass vulnerability could allow an attacker to access API functions without...Read More ...
Continue ReadingJuly 31, 2024
A command injection vulnerability could allow an authenticated user to execute operating system commands as root via a specially crafted API...Read More ...
Continue ReadingJuly 31, 2024
A denial-of-service vulnerability could allow an authenticated user to trigger an internal service restart via a specially crafted API...Read More ...
Continue ReadingJuly 31, 2024
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...
Continue ReadingJuly 31, 2024
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...
Continue ReadingJuly 31, 2024
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...
Continue ReadingJuly 31, 2024
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...
Continue ReadingJuly 31, 2024
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...
Continue ReadingJuly 31, 2024
Back to Main