Monday, August 20, 2018
Posted by Editorial_Staff_Team
Reader's rate:
0
Google Expands Existing Bug Bounty Program in 2018 Google now wants to reward security researchers who are able to report methods of misuse of googles product series. Google has expanded its bug bounty program to include rewards that go beyond reporting specific vulnerabilities. Security... + continue reading
Tuesday, July 24, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
New Banana PI R1 SD V3 Case Available The Banana Pi R1 is a router based on the same SoC as the M1 Classic Pi. The R1 is an open hardware router that runs on a variety of open source operating systems such as OpenWrt, Android and Bananian. The R1 has a slim router form factor with a bay for 2.5... + continue reading
Monday, July 23, 2018
Posted by Editorial_Staff_Team
Reader's rate:
4.5
Mozilla's New ASan Nightly Build Project Bug Bounty Program 2018 A new solution of the Nightly Build was opened with a bug bounty program from Mozilla Corporation in the last days. With a special variant of the Nightly Builds of the Firefox browser, users can search for memory errors... + continue reading
Thursday, July 19, 2018
Posted by Editorial_Staff_Team
Reader's rate:
3.75
Vulnerability Affecting Main Lead Database of Adobe Systems Within the last years the vulnerability lab core research team and individuals around the lab infrastructure discovered a lot of zero-day vulnerabilities to the psirt team of adobe system. More and more issues was resolved during the... + continue reading
Wednesday, July 18, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Microsoft Starts New & Unique Identity Bug Bounty Program Today the microsoft corporation started a new bug bounty program for the microsoft online identity server technology. To further increase the safety of its customers, the tech giant has launched a completely new and independent bug... + continue reading
Wednesday, July 11, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
New HackRF Case Available (ABS & PLA) HackRF One first version is part of great scott gadgets which is a software defined radio peripheral capable of transmission or reception of radio signals from 1 MHz to 6 GHz. The HackRF One can send and receive almost any radio signal. This allows... + continue reading
Thursday, July 5, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
AT&T BizCircle - Frontend & Backend Vulnerabilities Last month, researchers in our laboratory conducted in-depth safety tests on the AT&T BizCircle Platform. This has identified a number of security holes that AT&T has now eliminated. The core researchers in the laboratory go... + continue reading
Tuesday, March 13, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
Bug Bounty Program increases payments for researchers in 2018 Today in the morning the paypal inc bug bounty program updated again within one month the official bug bounty program conditions. The newst update of j.p. morgan increases the payment amounts to a new stage for participating security... + continue reading
Tuesday, February 27, 2018
Posted by Editorial_Staff_Team
Reader's rate:
5
PayPal Inc - Venmo Bug Bounty Program Today in the morning paypal inc announced its newst updates of the bug bounty program. The new service is called "Venmo" and became to today official part of the bug bounty program. For the program the official terms and process for submitting... + continue reading

Featured Cooperative Security Articles

Monday, 20/08/18 - 0 comment(s)
Google Expands Existing Bug Bounty Program in 2018 Google now wants to reward security researchers who are able to report methods of misuse of googles product series. Google has expanded its bug bounty program to include rewards that go beyond reporting specific vulnerabilities. Security researchers now also get rewards when they report... + continue reading
Tuesday, 24/07/18 - 0 comment(s)
New Banana PI R1 SD V3 Case Available The Banana Pi R1 is a router based on the same SoC as the M1 Classic Pi. The R1 is an open hardware router that runs on a variety of open source operating systems such as OpenWrt, Android and Bananian. The R1 has a slim router form factor with a bay for 2.5 hard drives. It also has 4 Gigabit LAN ports, 1... + continue reading

TOP SECURITY STORIES

Tuesday, 24/07/18 - 0 comment(s)
New Banana PI R1 SD V3 Case Available The Banana Pi R1 is a router based on the same SoC as the M1 Classic Pi. The R1 is an open hardware router that runs on a variety of open source operating... + continue reading

BUG BOUNTY ISSUES

Monday, 20/08/18 - 0 comment(s)
Google Expands Existing Bug Bounty Program in 2018 Google now wants to reward security researchers who are able to report methods of misuse of googles product series. Google has expanded its... + continue reading

VULNERABILITIES & BUGS

BEST SECURITY VIDEOS

Tuesday, 25/08/15 - 0 comment(s)
PayPal Inc patched medium severity Cross Site Request Forgery Issue The independent and individual vulnerability laboratory researcher paresh parmar discovered during the participate in the... + continue reading

LAB MAGAZINE ISSUES

Wednesday, 12/03/14 - 1 comment(s)
Vulnerability Magazine Welcome to the Vulnerability Magazine! The the vulnerability magazine, publishes the latest vulnerabilities and security informations from our laboratory infrastructure.... + continue reading

IT-SECURITY EVENTS

Friday, 24/11/17 - 1 comment(s)
Legendary free speech - You are the Key! In the last weeks we got invited to the very famous JBFone Conference organized by the Fiducia & GAD IT AG. The Fiducia & GAD IT AG is a public... + continue reading
Tue
28
Apr
Editorial_Staff_Team's picture

PayPal Inc Bug Bounty - JDWP Remote Code Execution Vulnerability

PayPal Inc Bug Bounty - JDWP Remote Code Execution Vulnerability

In the last weeks a new security researcher "Milan A Solanki" was activly reporting security bugs to paypal and ebay inc. One of his valid and verified issues was exclusivly disclosed by the vulnerability laboratory infrastructure. In april Milan A Solanki discovered a remote code execution vulnerability in the marketing online service web-application of paypal. The issue was marked as critical with a cvss count of 9.3.

The Java Debug Wire Protocol (JDWP) is the protocol used for communication between a debugger and the Java virtual machine (VM) which it debugs (hereafter called the target VM). JDWP is one layer within the Java Platform Debugger Architecture (JPDA). JDWP does not use any authentication and could be abused by an attacker to execute arbitrary code on the affected server.

Tue
28
Apr
Editorial_Staff_Team's picture

Egyptian Workshop - Bug Bounty & Security Research

Egyptian Workshop - Security Research & PenetrationTesting

The goal of the event is to spread the idea of information security within Egypt and attract Geeks and people who interested in information security.

We will discuss the following topics ...
1. How to begin your journey in hacking and penetration testing?
2. How to keep your personal information and website secure?
3. How can programmers use their knowledge in hacking to make secured applications?
4. What is Bug Bounty Programs and Who is the best security researchers who has the best influence on this field?

Everyboy of egypt is welcome to register and for sure we also support other african parties next to the event.

Pages

Subscribe to Vulnerability Magazine - Bug Bounties, Acknoweldgements & Security Research RSS