Constant-time comparison is not always implemented; critical areas are vulnerable to key-timing attacks
https://hackerone.com/reports/363680
null
anonimal
null
Phabricator is vulnerable to padding oracle attacks and chosen-ciphertext attacks.
https://hackerone.com/reports/216746
5.3
edoverflow
$750
Fedora installation instructions fetch repo and validation key from insecure source, allowing mitm attack
https://hackerone.com/reports/638250
null
hanno
$216