api-shop.e-tiketka.com Cross Site Scripting vulnerability OBB-2564459

Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...

Continue Reading
Reddit: Able to bypass email verification and change email to any other user email

The reporter discovered they were able to hijack invites to other ads teams by adding the extra field, email, to a request that would allow them to bypass email verification. By doing so they were abl ...

Continue Reading
Improper Access Control in Shopware

### Impact Permissions set to sales channel context by admin-api are still useable within normal user session ### Patches We recommend updating to the current version 6.4.10.1. You can get the update ...

Continue Reading
Denial of Service in http-swagger

### Impact Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system. ### Patches Yes. Please upgrade to v1.2.6. ### Workarounds A workaround is to restrict the pat ...

Continue Reading
Incorrect Default Permissions in CRI-O

### Impact A bug was found in CRI-O where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with i ...

Continue Reading
Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp

### Impact Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.Li ...

Continue Reading
Improper Input Validation in GeoServer

### Impact The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen ...

Continue Reading
Git LFS can execute a binary from the current directory on Windows

### Impact On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, ...

Continue Reading

Back to Main

Subscribe for the latest news: