Friday, November 16, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Open Redirect in Microsoft BingPlaces Business uncovered Security researchers of the vulnerability laboratory uncovered this week an open redirect vulnerability in the famous microsoft bingplaces business web-application. The issue allows to redirect users by client-side get method request to... + continue reading
Monday, August 20, 2018
Posted by Editorial_Staff_Team
Reader's rate:
0
Google Expands Existing Bug Bounty Program in 2018 Google now wants to reward security researchers who are able to report methods of misuse of googles product series. Google has expanded its bug bounty program to include rewards that go beyond reporting specific vulnerabilities. Security... + continue reading
Tuesday, July 24, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
New Banana PI R1 SD V3 Case Available The Banana Pi R1 is a router based on the same SoC as the M1 Classic Pi. The R1 is an open hardware router that runs on a variety of open source operating systems such as OpenWrt, Android and Bananian. The R1 has a slim router form factor with a bay for 2.5... + continue reading
Monday, July 23, 2018
Posted by Editorial_Staff_Team
Reader's rate:
4.5
Mozilla's New ASan Nightly Build Project Bug Bounty Program 2018 A new solution of the Nightly Build was opened with a bug bounty program from Mozilla Corporation in the last days. With a special variant of the Nightly Builds of the Firefox browser, users can search for memory errors... + continue reading
Thursday, July 19, 2018
Posted by Editorial_Staff_Team
Reader's rate:
3.75
Vulnerability Affecting Main Lead Database of Adobe Systems Within the last years the vulnerability lab core research team and individuals around the lab infrastructure discovered a lot of zero-day vulnerabilities to the psirt team of adobe system. More and more issues was resolved during the... + continue reading
Wednesday, July 18, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Microsoft Starts New & Unique Identity Bug Bounty Program Today the microsoft corporation started a new bug bounty program for the microsoft online identity server technology. To further increase the safety of its customers, the tech giant has launched a completely new and independent bug... + continue reading
Wednesday, July 11, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
New HackRF Case Available (ABS & PLA) HackRF One first version is part of great scott gadgets which is a software defined radio peripheral capable of transmission or reception of radio signals from 1 MHz to 6 GHz. The HackRF One can send and receive almost any radio signal. This allows... + continue reading
Thursday, July 5, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
AT&T BizCircle - Frontend & Backend Vulnerabilities Last month, researchers in our laboratory conducted in-depth safety tests on the AT&T BizCircle Platform. This has identified a number of security holes that AT&T has now eliminated. The core researchers in the laboratory go... + continue reading
Tuesday, March 13, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Bug Bounty Program increases payments for researchers in 2018 Today in the morning the paypal inc bug bounty program updated again within one month the official bug bounty program conditions. The newst update of j.p. morgan increases the payment amounts to a new stage for participating security... + continue reading

Featured Cooperative Security Articles

Friday, 16/11/18 - 0 comment(s)
Open Redirect in Microsoft BingPlaces Business uncovered Security researchers of the vulnerability laboratory uncovered this week an open redirect vulnerability in the famous microsoft bingplaces business web-application. The issue allows to redirect users by client-side get method request to external malformed or malicious sources. The open... + continue reading
Monday, 20/08/18 - 0 comment(s)
Google Expands Existing Bug Bounty Program in 2018 Google now wants to reward security researchers who are able to report methods of misuse of googles product series. Google has expanded its bug bounty program to include rewards that go beyond reporting specific vulnerabilities. Security researchers now also get rewards when they report... + continue reading

TOP SECURITY STORIES

Tuesday, 24/07/18 - 0 comment(s)
New Banana PI R1 SD V3 Case Available The Banana Pi R1 is a router based on the same SoC as the M1 Classic Pi. The R1 is an open hardware router that runs on a variety of open source operating... + continue reading

BUG BOUNTY ISSUES

Friday, 16/11/18 - 0 comment(s)
Open Redirect in Microsoft BingPlaces Business uncovered Security researchers of the vulnerability laboratory uncovered this week an open redirect vulnerability in the famous microsoft bingplaces... + continue reading

VULNERABILITIES & BUGS

BEST SECURITY VIDEOS

Tuesday, 25/08/15 - 0 comment(s)
PayPal Inc patched medium severity Cross Site Request Forgery Issue The independent and individual vulnerability laboratory researcher paresh parmar discovered during the participate in the... + continue reading

LAB MAGAZINE ISSUES

Wednesday, 12/03/14 - 1 comment(s)
Vulnerability Magazine Welcome to the Vulnerability Magazine! The the vulnerability magazine, publishes the latest vulnerabilities and security informations from our laboratory infrastructure.... + continue reading

IT-SECURITY EVENTS

Friday, 24/11/17 - 1 comment(s)
Legendary free speech - You are the Key! In the last weeks we got invited to the very famous JBFone Conference organized by the Fiducia & GAD IT AG. The Fiducia & GAD IT AG is a public... + continue reading
Fri
16
Nov
Editorial_Staff_Team's picture

Microsoft BingPlaces Business - (url) Redirect Vulnerability

Open Redirect in Microsoft BingPlaces Business uncovered

Security researchers of the vulnerability laboratory uncovered this week an open redirect vulnerability in the famous microsoft bingplaces business web-application. The issue allows to redirect users by client-side get method request to external malformed or malicious sources.

The open redirect security vulnerability is located in the `url` parameter of the `TrackEmailOpen` function in the `StatsTracker` module. The `url` parameter has no restriction to the requested url content. Remote attackers are able to redirect client-side get method requests because of a non restricted url parameter. The attack vector of the vulnerability is non-persistent and the request method to execute is get. The vulnerability is a classic open redirect web vulnerability.

Vulnerable Module(s):
[+] StatsTracker

Mon
20
Aug
Editorial_Staff_Team's picture

Google Expands Vulnerability Reward Program - Combat Platform Abuse in 2018

Google Expands Existing Bug Bounty Program in 2018

Google now wants to reward security researchers who are able to report methods of misuse of googles product series.

Google has expanded its bug bounty program to include rewards that go beyond reporting specific vulnerabilities. Security researchers now also get rewards when they report methods and techniques that hackers could use to abuse google products and services.

This could be a starting point for enumeration attacks, compromises or a way to circumvent security mechanisms, google employees explains in a blog entry. Rewards of up to $5,000 are waiting researchers on valid submits. In a more detailed blog post the google security team explains about the extended bug bounty program conditions of the program.

Pages

Subscribe to Vulnerability Magazine - Bug Bounties, Acknoweldgements & Security Research RSS