Exploit for Command Injection in Atlassian Bitbucket

# CVE-2022-36804: Pre-Auth RCE in Atlassian Bitbucket Server A c...Read More ...

Continue Reading

CVSS3 - HIGH

CVE-2021-43445

ONLYOFFICE all versions as of 2021-11-08 is affected by Incorrect Access Control. An attacker can authenticate with the web socket service of the ONLYOFFICE document editor which is protected by JWT a ...

Continue Reading
prospektbestellung.toubiz.de Cross Site Scripting vulnerability OBB-3166326

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
femalespiritpower.de Cross Site Scripting vulnerability OBB-3166329

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
biederbach.de Cross Site Scripting vulnerability OBB-3166331

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
mct-rent.ru Cross Site Scripting vulnerability OBB-3166357

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
freshbrothers.com Cross Site Scripting vulnerability OBB-3166360

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
mediasphera.ru Cross Site Scripting vulnerability OBB-3166361

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading

Back to Main

Subscribe for the latest news: