bridgeresults.net Cross Site Scripting vulnerability OBB-3402797

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
prosea-bamboos.linnaeus.naturalis.nl Cross Site Scripting vulnerability OBB-3402802

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
uruknet.de Cross Site Scripting vulnerability OBB-3402811

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
fan.theonering.net Cross Site Scripting vulnerability OBB-3402826

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
Cisco Unified Communications Manager Denial of Service Vulnerability

A vulnerability in the Administrative XML Web Service (AXL) API of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME ...

Continue Reading
OWASP API Security Top-10 for 2023 Risk Ratings

As you know by now, the final version of the [OWASP API Security Top-10 2023]() has been released. At first blush, the final 2023 release seems to retain most of the changes in category naming, langua ...

Continue Reading
CVE-2021-4379

The WooCommerce Multi Currency plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wmc_bulk_fixed_price function in versions up to, and including, 2.1.1 ...

Continue Reading
CVE-2020-36728

The Adning Advertising plugin for WordPress is vulnerable to file deletion via path traversal in versions up to, and including, 1.5.5. This allows unauthenticated attackers to delete arbitrary files w ...

Continue Reading

Back to Main

Subscribe for the latest news: