Following the coordinated and responsible vulnerability disclosure guidelines of the **[ISO 29147]()** standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. not ...
Continue ReadingJune 29, 2022
![Application Security in 2022: Where Are We Now?](https://blog.rapid7.com/content/images/2022/06/appsec-in-2022.jpg) ItÂ’s always a good thing to take a step back every once in a while to take the la ...
Continue ReadingJune 29, 2022
CVA6 commit 909d85a accesses invalid memory when reading the value of MHPMCOUNTER30.Read More ...
Continue ReadingJune 29, 2022
This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJune 29, 2022
This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJune 29, 2022
This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJune 29, 2022
MetaMask before 10.11.3 might allow an attacker to access a user's secret recovery phrase because an input field is used for a BIP39 mnemonic, and Firefox and Chromium save such fields to disk in orde ...
Continue ReadingJune 29, 2022
ApiFest OAuth 2.0 Server 0.3.1 does not validate the redirect URI in accordance with RFC 6749 and is susceptible to an open redirector attack. Specifically, it directly sends an authorization code to ...
Continue ReadingJune 29, 2022
Back to Main