Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...
Continue ReadingJanuary 20, 2023
Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...
Continue ReadingJanuary 20, 2023
Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...
Continue ReadingJanuary 20, 2023
Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...
Continue ReadingJanuary 20, 2023
Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...
Continue ReadingJanuary 20, 2023
swift is vulnerable to XML External Entity (XXE) attacks. The vulnerability allows a remote authenticated attacker to access potentially sensitive data in S3 buckets by persuading the `S3 API` into re ...
Continue ReadingJanuary 20, 2023
github.com/kubeoperator/kubepi is vulnerable to Improper Access Control. A remote attacker is able to bypass the system's preset permission settings to access restricted API interfaces which leak sens ...
Continue ReadingJanuary 20, 2023
apache-superset is vulnerable to Cross-Site Request Forgery (CSRF). The vulnerability exists due to the use of the HTTP GET method for the legacy REST API endpoints in the `request_access` and `approv ...
Continue ReadingJanuary 20, 2023
Back to Main