-
I understand that it is not a priority for this project, but it would be helpful if there was a list of the security flaws to be aware of in WordPerfect. As I recall, it was designed for a single-user…
-
1.) Root - Passwort dringend ändern!
2.) Router gegen ssh - Zugriffen sperren,
3.) Pi - Passwort dringend ändern!
4.) das File mit dem Klartextpasswort sollte die Berechtigungen 0400 haben, der Own…
-
few potential security vulnerability has been disclosed to huntr for your repo .
You can read/validate the report using bellow link .
https://huntr.dev/bounties/7beb415d-a726-4203-936e-95ddc0c784df…
-
One of the Veteran-Cord users have found a way to brute-force a DEC file. The main issues are the C# ushort and "ENCODED" check. These two flaws narrow it down to 65 536 combinations, so it MUST be fi…
ghost updated
7 years ago
-
Hello,
I noticed that you reverted the security patch from in version 1.1.5, thus commit #d9f34eebffb8efb4dfe2ff8e429b97f7e16f0999 reintroduced remote code execution again.
This issue has been a…
-
**Github username:** @0xmahdirostami
**Twitter username:** 0xmahdirostami
**Submission hash (on-chain):** 0x043ecfb1a268e58df701e8b70701f98617a303ba8adf0501e03b0b0510d645bb
**Severity:** low
**Descr…
-
Hi @lirbank!
I'm studying your code a bit better, and I have some concerns about possible security flaws.
The thing is that the method 'mergeAccounts' is freely accessible from client-side and a malic…
-
Hi @MarkusBernhardt ,
We scanned proxy-vole on Veracode, and found some very high flaws as following:
![image](https://user-images.githubusercontent.com/2956318/65485636-f8327480-ded4-11e9-9819-b…
-
Use some developer funds and create a bounty program to pay researchers who find security problems with the NEST protocol (miner, verifier, oracle).
This will make Nest more secure and also generat…
-
Hi!
While I was running my fuzz tests in the background I discovered multiple memory corruption security flaws in libforth Version 4.0 at various locations. I have attached a zip archive named cras…