Jump to content

Recommended Posts

Posted
8 minutes ago, Nathan Explosion said:

"Open Bug Bounty" is what I have assumed is this -> https://www.openbugbounty.org/

I got an email from them as well about one of my IPS installations. Something was reported by: https://www.openbugbounty.org/researchers/Cyber_India/

Security Researcher Cyber_India, a holder of 5 badges for responsible and coordinated disclosure, found a Improper Access Control security vulnerability

image.png

  • 3 years later...
Posted
58 minutes ago, Kjell Iver Johansen said:

Did you evner get an answer from them about this? Got same email today - I’m on latest version…

You are responding to something over 4 years old there, but the same answer would apply. You would need to ask for specifics on what they are referring to

Posted

It’s most likely a sales pitch. “Contact me right away to protect your users.” 

This rings right up there with “Contact us about your car’s extended warranty.”

They want you to offer them a reward for scanning and pentesting your site.  

Posted
5 hours ago, AlexWebsites said:

I did not but got an email as well, today. 

The answer would be the same as the 2 above. You would need more information from

  • 1 month later...
Posted
On 8/2/2024 at 9:53 AM, Marc said:

You are responding to something over 4 years old there, but the same answer would apply. You would need to ask for specifics on what they are referring to

Just got a Mail from them and on my site it was php info.php that was public. I have deleted it now. Not that dangerous but anyway…

This information includes the PHP version, server details, loaded extensions, environment variables, and more. An attacker can use this data to identify weaknesses in the server configuration and potentially craft specific attacks against the server.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...