Weak credentials were discovered in a Jenkins endpoint. The issue was reported to IBM, analyzed, and...Read More ...
Continue ReadingFebruary 08, 2025
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...
Continue ReadingFebruary 08, 2025
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...
Continue ReadingFebruary 08, 2025
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified th ...
Continue ReadingFebruary 08, 2025
Vulnerability description not...Read More ...
Continue ReadingFebruary 08, 2025
The vulnerability in the Undici library involves the use of an unsafe random function to choose the boundary for a multipart/form-data request. The use of Math.random() to generate this boundary can b ...
Continue ReadingFebruary 08, 2025
CVE-2024-56374: Potential denial-of-service vulnerability in IPv6 validation A potential denial-of-service vulnerability was discovered in the IPv6 validation functions of Django. The lack of an upper ...
Continue ReadingFebruary 08, 2025
Vulnerability description not...Read More ...
Continue ReadingFebruary 08, 2025
Back to Main