Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...
Continue ReadingAugust 07, 2023
Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...
Continue ReadingAugust 07, 2023
A bunch of networks, including [US Government networks](), have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using a [stolen]() [Microsoft]() Azure a ...
Continue ReadingAugust 07, 2023
Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api- ...
Continue ReadingAugust 07, 2023
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection.Read More ...
Continue ReadingAugust 07, 2023
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in advcomsys.com oneVote component for Joomla. It allows XSS Targeting Non-Script Elements.Read More ...
Continue ReadingAugust 07, 2023
The event analysis component in Zoho ManageEngine ADAudit Plus 7.1.1 allows an attacker to bypass audit detection by creating or renaming user accounts with a "$" symbol suffix.Read More ...
Continue ReadingAugust 07, 2023
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection.Read More ...
Continue ReadingAugust 07, 2023
Back to Main