[EXCLUSIVE PROGRAMS] [BUG BOUNTY LIST ] [HACKTIVITY] | |
Account [RegistrationRole [Anonymous] Researcher: 1094 Advisories: 900 Documents: 32 Videos: 178 Date: 29.08.2016 TZ: 21:50

[ Home ] [ Mobile ] [ Vendor ] [ Web-Application ] [ Remote ] [ Local ] [ Websites ] [ Documents ] [ Videos ] [ Search ] [ FAQ ]

[ Pending on Laboratory ]

DDateRAdvisory NameVSTypeViewsAuthor
D2016-08-15Parallels Plesk 12.5.30 #41 - ***** ***** Vulnerability3.7Remote387Vulnerability-Lab
D2016-08-13FullContact BB #2 - ***** ***** *** Vulnerability3.7Remote458SaifAllahbenMassaoud
Note: The pending status shows, that the vulnerability report is already successful tracked to the dbms with valid impact.

[ Verified by Laboratory ]

DDateRAdvisory NameVSTypeViewsAuthor
D2016-08-26Schoolhos CMS v2_29 - ***** ***** *** Vulnerability 6.8Remote0Lawrence Amer
D2016-08-26Schoolhos CMS v2_29 - ***** ***** *** Vulnerability 6.7Remote3Lawrence Amer
D2016-08-26Microsoft (MEPN EDU) - ***** ***** *** Vulnerability3Remote3MOHDAQEELAHMED
D2016-08-23Contenido v4.9.11 - ***** ***** *** Vulnerabilities3.7Remote10Benjamin K.M.
D2016-08-23iJoomla com_adagency 6.0.9 - ***** ***** Vulnerabilities7.1Remote8Benjamin K.M.
D2016-08-22Kaspersky Company Account - ***** ***** ***3.5Remote10Lawrence Amer
D2016-08-20Shopware v5.2.5 - ***** ***** *** Vulnerabilities4.4Remote14Vulnerability-Lab
D2016-08-19Magento BB #26 Products (Tier 1) - ***** Vulnerability3.8Remote16Benjamin K.M.
D2016-08-14Flash Operator Panel 2.31.03 - ***** Vulnerability3.6Local333Benjamin K.M.
D2016-08-14Flash Operator Panel 2.31.03 - ***** *****6.1Remote351Benjamin K.M.
D2016-08-14Flash Operator Panel 2.31.03 - ***** Vulnerabilities3.4Remote563Benjamin K.M.
D2016-08-14BlackBoard LMS 9.1 SP14 - ****** Vulnerability 3.6Remote134Lawrence Amer
D2016-08-10Blackboard LMS 9.1 SP14 - ***** ***** Vulnerability 4.2Remote532Lawrence Amer
D2016-07-26Docebo LMS v6.9 - ***** ***** *** Vulnerability3.3Remote1447Lawrence Amer
D2016-07-25Docebo LMS v6.9 - ***** ***** *** Vulnerability3.5Remote1374Lawrence Amer
Note: The verified by laboratory status shows, that the vulnerability is verified and reproduced by the internal core team.

[ Accepted by Vendor ]

DDateRAdvisory NameVSTypeViewsAuthor
D2016-07-20SonicWall SonicOS NSA Series - ***** ***** Vulnerabilities3.8Remote12382Benjamin K.M.
D2016-07-05Edusson (Robotdon) BB #1 - ***** ***** *** Vulnerability3.4Remote2735Vulnerability-Lab
D2016-07-05Edusson (Robotdon) BB #2 - ***** ***** *** Vulnerability4.3Remote2743Vulnerability-Lab
D2016-06-27SonicWall GMS v8.1 - ***** ***** *** Vulnerability3.5Remote8495Vulnerability-Lab
D2016-06-27SonicWall SonicOS NSA Series - ***** ***** Vulnerability4Remote12206Benjamin K.M.
D2016-05-24Cyberoam iview UTM v0.1.2.7 - ***** ***** Vulnerability 3.2Remote5408Lawrence Amer
D2016-05-24Adobe CreativeCloud (Webform) - ******** Vulnerability3.5Remote5780Vulnerability-Lab
D2016-05-04Adobe CreativeCloud - ***** ***** *** Vulnerability3.5Remote6822Benjamin K.M.
D2016-04-27Adobe Connect - ***** ***** *** Vulnerability3.7Remote7255Benjamin K.M.
D2016-04-26CentOS Web Panel (CWP) v0.9.8.12 - ***** Vulnerability7.5Remote7667Vulnerability-Lab
D2016-04-26CentOS Web Panel (CWP) v0.9.8.12 - ***** Vulnerabilities3.7Remote7316Vulnerability-Lab
D2016-04-26CentOS Web Panel (CWP) v0.9.8.12 - ***** Vulnerabilities3.3Remote7310Vulnerability-Lab
D2016-02-25Facebook Bug Bounty #30 - ***** ***** Vulnerability3.1Remote11646Hadji Samir
D2016-02-05Bit Defender Bug Bounty #39 - ***** ***** Vulnerability5.6Remote10701Lawrence Amer
D2015-08-15Shopify Bug Bounty #6 - ***** ***** *** Vulnerability3.4Remote21961Hadji Samir
D2015-08-15Shopify Bug Bounty #5 - ***** ***** Vulnerability6.2Remote22018Hadji Samir
D2015-08-15Shopify Bug Bounty #7 - ***** ***** Vulnerability3.3Remote21888Hadji Samir
D2015-06-30Ebay Inc Magento Bug Bounty #15 - ***** *** Vulnerability3.8Remote24911Hadji Samir
D2015-04-23Ebay Inc Magento #11 - ***** ***** Vulnerability3.9Remote23486Hadji Samir
D2015-04-23Ebay Inc Magento Bug Bounty #11 - ***** *** Vulnerability3.9Remote24170Hadji Samir
Note: The accepted by vendor status shows, that the manufacturer has confirmed, reproduced & accepted the report.


[MAGAZINE] [CHAT] [August] 26 Critical: 0 High: 8 Medium: 18 Low: 0 Best Researcher: [ZwX] Threat:

© EVOLUTION SECURITY GmbH ™