herschi.com.mx Cross Site Scripting vulnerability OBB-4049081

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...

Continue Reading
curl: CRLF Injection in `–proxy-header` allows extra HTTP headers (CWE-93)

Vulnerability description not...Read More ...

Continue Reading
paynecountyok.gov Cross Site Scripting vulnerability OBB-4049089

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...

Continue Reading
mensa.es Cross Site Scripting vulnerability OBB-4048750

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...

Continue Reading
manuall.cz Cross Site Scripting vulnerability OBB-4048836

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...

Continue Reading
manuales.educativa.com Cross Site Scripting vulnerability OBB-4048833

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...

Continue Reading
curl: Double Free Vulnerability in `libcurl` Cookie Management (`cookie.c`)

Vulnerability description not...Read More ...

Continue Reading
installconfort.blog4ever.com Cross Site Scripting vulnerability OBB-4049029

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...

Continue Reading

Back to Main

Subscribe for the latest news: