wurst-schneestopp.de Cross Site Scripting vulnerability OBB-4015722

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...

Continue Reading
curl: CVE-2025-0167: netrc and default credential leak

Vulnerability description not...Read More ...

Continue Reading
Internet Bug Bounty: CVE-2024-56374 Potential denial-of-service in IPv6 validation

CVE-2024-56374: Potential denial-of-service vulnerability in IPv6 validation A potential denial-of-service vulnerability was discovered in the IPv6 validation functions of Django. The lack of an upper ...

Continue Reading
XVIDEOS: Open redirect

Vulnerability description not...Read More ...

Continue Reading
Internet Bug Bounty: #2931639 ActionView sanitize helper bypass with math-related tags

There is a vulnerability in Rails-HTML-Sanitizer 1.6.0, which is also used by Rails ActionView. The vulnerability allows for bypassing the sanitization process when certain math-related tags, such as ...

Continue Reading
Internet Bug Bounty: ActionView sanitize helper bypass with style

The Rails-html-sanitizer, which Rails ActionView also uses, failed to sanitize input when the style tag was allowed, leading to a potential XSS vulnerability. The vulnerability affected version 1.6.0 ...

Continue Reading
Internet Bug Bounty: ActionView sanitize helper bypass with ‘style’ and ‘svg’ tags

The Rails-html-sanitizer, which Rails ActionView also uses, failed to sanitize input when svg and style or math and style tags were allowed. This resulted in a potential XSS vulnerability in applicati ...

Continue Reading
Internet Bug Bounty: ActionView sanitize helper bypass with noscript

The Rails-html-sanitizer 1.6.0 contained a vulnerability that allowed bypassing the sanitization process when the noscript tag was used. This could have led to potential cross-site scripting (XSS) att ...

Continue Reading

Back to Main

Subscribe for the latest news: