CVE | Vulnerability name | Date | Responsible Security Disclosure by | Vulnerabilities |
---|---|---|---|---|
TODO | SocialBleed
|
2023-05-11 19.14 EET |
Rajesh Thapa Did send detailed report! |
|
TODO | AdminBleed
|
2023-04-24 16.40 EET |
Christian Pöschl of usd AG Responsible Disclosure Team Did send detailed report! |
|
TODO | InvisibleBleed
|
2023-04-24 03.35 EET |
Someone at chat Sent report and disappeared. |
|
CVE-2023-31779 | ReactionBleed |
2023-02-28 12.36 EET |
Alexander Starikov at Jet Infosystems Did send detailed report and fix! |
|
TODO | Filebleed |
2023-02-16 17.35 EET |
SEC Consult, an Atos company Did send detailed report! |
|
TODO | Emailbleed |
2021-01-26 12.42 EET |
Georg Krause Did send detailed report! |
|
CVE-2021-3309 | LDAPbleed |
2021-01-26 0:42 EET |
robert-scheck Did send report and sent fix! Although, report was at public GitHub issue, not via Responsible Security Disclosure |
|
TODO | DUEbleed |
2021-01-11 EET |
xet7 - maintainer of Wekan Did not notice security issue originally when merging new feature from pull request. Did fix issue when finally noticed it at production at Wekan demo server. |
|
CVE-2021-20654 VRF#20-08-MDPNJ. VN: JVN#80785288 for attachments. New report JVN#74210258, investigating |
Fieldbleed |
JVN#80785288 2020-03-23 17.03 EET JVN#74210258 2022-05-23 13.33 EET |
Cyb3rjunky and swsjona about input fields. Ryoya Koyama at Mitsui Bussan Secure Directions, Inc. (https://www.mbsd.jp/) about Javascript inside .SVG attachment Did send detailed report! |
|
VRF#20-08-SGSSC. | Bypassbleed |
2020-02-26 01:36 EET |
Dejan Zelic, Justin Benjamin and others at Offensive Security Did send detailed report and helped fixing! |
|
VRF#20-08-DDFJJ. | Userbleed |
2018-06-12 |
Adrian Genaid at PLANTA Projektmanagement-Systeme GmbH Did send detailed report and fix! |
|
CVE-2018-1000549, In Progress Update Request 938446 |
Brutebleed |
2018-06-12 |
Shadow Vault Did not report to Wekan, was found later from CVE |
|
VRF#20-08-LZGVF. | Framebleed |
2018-03-25 |
Team Did send detailed report! |
|