Monday, July 3, 2023
Posted by Editorial_Staff_Team
Reader's rate:
3.32487
Citrix Gateway... + continue reading
Tuesday, October 11, 2022
Posted by Editorial_Staff_Team
Reader's rate:
5
DNS Cache Snooping Vulnerability on Wifi Hotspots by Siemens The Rhein-Ruhr-Express (RRX) is a program currently being implemented to provide regional transport on the core route of the Ruhr area and the central Rhineland from Dortmund via Essen, Duisburg and Düsseldorf to Cologne. The RXX is... + continue reading
Monday, October 25, 2021
Posted by Editorial_Staff_Team
Reader's rate:
3.333335
Responsible Disclosure Program (VDPBW) 2021 One year has now passed since the Bundeswehr made public the first vulnerability disclosure policy (vdpbw) for a responsible disclosure program. Since our security researchers always like to be the first to test and actively participate in a bug bounty... + continue reading
Tuesday, October 19, 2021
Posted by Editorial_Staff_Team
Reader's rate:
5
A vulnerability researcher of the vulnerability lab team disclosed a simple but effective technique that was used against microsoft and adobe some years ago. A persistent input validation web vulnerability has been discovered in the official BMW online service portal web-application. The... + continue reading
Wednesday, July 28, 2021
Posted by Editorial_Staff_Team
Reader's rate:
5
10th Anniversary - VRP Upgrade Google announced this week on its official security blog that the current bug bounty program will be rebranded for its anniversary. As with other vulnerability disclosure platforms, a gamification model will be used to further motivate the research community.... + continue reading
Tuesday, April 6, 2021
Posted by Editorial_Staff_Team
Reader's rate:
3.5
New Teams Desktop Client Bug Bounty Program Microsoft Teams is a platform developed by Microsoft that combines chat, meetings, notes and attachments. The service is integrated into the Microsoft 365 suite with Microsoft Office and Skype/Skype for Business. In recent weeks, microsoft's msrc... + continue reading
Friday, January 15, 2021
Posted by Editorial_Staff_Team
Reader's rate:
5
New Ebay Inc Identity Security Check Default PIN in 2021 In the last weeks we have reviewed several identity security check mechanisms of large coporates. Due to that we figured out a funny case with ebay inc. Ebay inc owns a new security identity check function that uses a algorithm to... + continue reading
Thursday, October 22, 2020
Posted by Editorial_Staff_Team
Reader's rate:
4.76923
Bundeswehr Responsible Disclosure Program (VDPBw) Today, on october 22, the German Armed Forces "Bundeswehr" officially launched the new Responsible Disclosure Program for reporting vulnerabilities and security vulnerabilities. Preparations have been underway for a few weeks now and can be... + continue reading
Wednesday, September 16, 2020
Posted by Editorial_Staff_Team
Reader's rate:
4
Bypassing using Exchange of Session Credentials In recent weeks, a new application has been released at the sparkasse in germany. This is the "secure safe" for documents... + continue reading

Featured Cooperative Security Articles

Tuesday, 11/10/22 - 0 comment(s)
DNS Cache Snooping Vulnerability on Wifi Hotspots by Siemens The Rhein-Ruhr-Express (RRX) is a program currently being implemented to provide regional transport on the core route of the Ruhr area and the central Rhineland from Dortmund via Essen, Duisburg and Düsseldorf to Cologne. The RXX is from the company "Abello". The vehicles of the RRX... + continue reading

TOP SECURITY STORIES

BUG BOUNTY ISSUES

Wednesday, 28/07/21 - 0 comment(s)
10th Anniversary - VRP Upgrade Google announced this week on its official security blog that the current bug bounty program will be rebranded for its anniversary. As with other vulnerability... + continue reading

BEST SECURITY VIDEOS

Thursday, 07/03/19 - 2 comment(s)
Telekom Magenta Musik 360 - CERT Coordinates The videos shows the reproduce for the german telekom in a new service they did publish in 2019 Q1. The vulnerabilities are persistent and non-... + continue reading

IT-SECURITY EVENTS

Thursday, 23/11/17 - 2 comment(s)
Legendary free speech - You are the Key! In the last weeks we got invited to the very famous JBFone Conference organized by the Fiducia & GAD IT AG. The Fiducia & GAD IT AG is a public... + continue reading
Sun
01
Feb

Announcement of Winners - Best Bug Bounty Program, Best Upcoming Program & Best Issue in 2014

Best Bug Bounty Program, Best Upcoming Bug Bounty Program & Best Bug Bounty Issue in 2014

In september 2014 last year we started a large campaign to reward the "Best Bug Bounty Program" and "Best Upcoming Bug Bounty Program" in 2014.

Next to the new special event we also coordinated to reward the best bug bounty submission of the year 2014 in the Vulnerability Laboratory with a special trophy.

100 active Vulnerability Laboratory members started to vote the "Best Bug Bounty Program 2014" followed by 101 independent vulnerability researchers and bug bounty hunters. The best bug bounty program of the year 2014 must have the following characteristics to win the independent security competition.

Fri
30
Jan

Glibc Ghost Vulnerability (CVE-2015-0235) - How to Secure ?

Glibc Ghost Vulnerability (CVE-2015-0235) - How to Secure ?

The security researcher and analyst of Akati Consulting Pvt Ltd  (Rajivarnan R.) discovered a prevention white-paper that explains the impact of the Glibc (Linux) Ghost Vulnerability.

[CVE-ID 2015-0235]

A Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST." The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. CVE-2015-0235 has been assigned to this issue.

Pages

Subscribe to Vulnerability Magazine - Acknoweldgements, Bug Bounties & Security Research RSS