Skip to content

gkcodez/bug-bounty-reports-hackerone

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Recent reports:

S.No Title
1 Recently disclosed

Top reports:

S.No Title
1 Top upvotes
2 Top bounties

Reports based on vulnerability:

S.No Title
1 Allocation of resources without limits or throttling
2 Array index underflow
3 Authentication bypass
4 Authentication bypass by primary weakness
5 Authentication bypass using an alternate path or channel
6 Blind sql injection
7 Brute force
8 Buffer over read
9 Buffer under read
10 Buffer underflow
11 Business logic errors
12 Cache poisoning
13 Classic buffer overflow
14 Cleartext storage in a file or on disk
15 Cleartext storage of sensitive information
16 Cleartext transmission of sensitive information
17 Client side enforcement of server side security
18 Code injection
19 Command injection generic
20 Concurrent execution using shared resource with improper synchronization
21 Content spoofing
22 Crlf injection
23 Cross site request forgery csrf
24 Cross site scripting xss
25 Cross site scripting xss dom
26 Cross site scripting xss generic
27 Cross site scripting xss reflected
28 Cross site scripting xss stored
29 Cryptographic issues generic
30 Deserialization of untrusted data
31 Double free
32 Download of code without integrity check
33 Embedded malicious code
34 Encoding error
35 Execution with unnecessary privileges
36 Expected behavior violation
37 Exposed dangerous method or function
38 Exposure of sensitive information due to incompatible policies
39 External control of critical state data
40 External control of file name or path
41 Externally controlled reference to a resource in another sphere
42 Failure to sanitize special elements into a different plane special element injection
43 File and directory information exposure
44 Forced browsing
45 Free of memory not on the heap
46 Heap overflow
47 Http request smuggling
48 Http response splitting
49 Improper access control generic
50 Improper authentication generic
51 Improper authorization
52 Improper certificate validation
53 Improper check for certificate revocation
54 Improper check or handling of exceptional conditions
55 Improper export of android application components
56 Improper following of a certificate
57 Improper handling of insufficient permissions or privileges
58 Improper handling of url encoding hex encoding
59 Improper input validation
60 Improper neutralization of escape
61 Improper neutralization of http headers for scripting syntax
62 Improper neutralization of script related html tags in a web page basic xss
63 Improper null termination
64 Improper privilege management
65 Improper removal of sensitive information before storage or transfer
66 Improper restriction of authentication attempts
67 Improper synchronization
68 Improper validation of certificate with host mismatch
69 Improper verification of cryptographic signature
70 Inadequate encryption strength
71 Inclusion of functionality from untrusted control sphere
72 Inconsistency between implementation and documented design
73 Incorrect authorization
74 Incorrect calculation of buffer size
75 Incorrect permission assignment for critical resource
76 Information disclosure
77 Information exposure through an error message
78 Information exposure through debug information
79 Information exposure through directory listing
80 Information exposure through sent data
81 Information exposure through timing discrepancy
82 Insecure direct object reference idor
83 Insecure storage of sensitive information
84 Insecure temporary file
85 Insufficient session expiration
86 Insufficient verification of data authenticity
87 Insufficiently protected credentials
88 Integer overflow
89 Integer underflow
90 Key exchange without entity authentication
91 Ldap injection
92 Leftover debug code backdoor
93 Llm01
94 Llm02
95 Llm06
96 Malware
97 Man in the middle
98 Memory corruption generic
99 Misconfiguration
100 Misinterpretation of input
101 Missing authentication for critical function
102 Missing authorization
103 Missing critical step in authentication
104 Missing encryption of sensitive data
105 Missing required cryptographic step
106 Modification of assumed immutable data maid
107 Null pointer dereference
108 Off by one error
109 Open redirect
110 Os command injection
111 Out of bounds read
112 Password in configuration file
113 Path traversal
114 Path traversal
115 Path traversal
116 Phishing
117 Php local file inclusion
118 Plaintext storage of a password
119 Privacy violation
120 Privilege escalation
121 Relative path traversal
122 Reliance on cookies without validation and integrity checking in a security decision
123 Reliance on reverse dns resolution for a security critical action
124 Reliance on untrusted inputs in a security decision
125 Remote file inclusion
126 Resource injection
127 Reusing a nonce
128 Security through obscurity
129 Server side request forgery
130 Server side request forgery ssrf
131 Session fixation
132 Sql injection
133 Stack overflow
134 Storing passwords in a recoverable format
135 Time of check time of use toctou race condition
136 Type confusion
137 Ui redressing clickjacking
138 Unchecked error condition
139 Uncontrolled recursion
140 Uncontrolled resource consumption
141 Unprotected transport of credentials
142 Unrestricted upload of file with dangerous type
143 Untrusted search path
144 Unverified password change
145 Use after free
146 Use of a broken or risky cryptographic algorithm
147 Use of a key past its expiration date
148 Use of cache containing sensitive information
149 Use of cryptographically weak pseudo random number generator prng
150 Use of default credentials
151 Use of externally controlled format string
152 Use of hard coded credentials
153 Use of hard coded cryptographic key
154 Use of hard coded password
155 Use of incorrectly resolved name or reference
156 Use of inherently dangerous function
157 Use of insufficiently random values
158 User interface ui misrepresentation of critical information
159 Using components with known vulnerabilities
160 Violation of secure design principles
161 Weak cryptography for passwords
162 Weak password recovery mechanism for forgotten password
163 Wrap around error
164 Write what where condition
165 Xml entity expansion
166 Xml external entities xxe
167 Xml injection

Reports based on severity:

S.No Title
1 Critical
2 High
3 Low
4 Medium
5 None

Reports based on asset type:

S.No Title
1 Apple
2 Cidr
3 Downloadable
4 Google
5 Hardware
6 Other
7 Other
8 Source
9 Url
10 Wildcard

Reports based on program:

S.No Title
1 8x8
2 8x8 bounty
3 A
4 Acronis
5 Adobe
6 Affirm
7 Airbnb
8 Aiven ltd
9 Algolia
10 Alliance of american football
11 Alohi
12 Apitest
13 Arkadiyt projects
14 Aspen
15 Automattic
16 Avito
17 Aws vdp
18 Azbuka vkusa
19 Basecamp
20 Bcm messenger
21 Bime
22 Bitaccess
23 Bitwarden
24 Blackrock
25 Blockchain
26 Blockdev sp
27 Blockfi
28 Bohemia interactive a
29 Bookfresh
30 Brave software
31 Btfs
32 Bumble
33 C2fo
34 Central security project
35 Cert
36 Certly
37 Cfp time
38 Chainlink
39 Chaturbate
40 Clario
41 Cloudflare public bug bounty
42 Coalition
43 Coda
44 Codeigniter
45 Coinbase
46 Companyhub
47 Concrete cms
48 Consensys
49 Cosmos
50 Courier
51 Coursera
52 Cs money
53 Curl
54 Curve
55 Dashlane
56 Datastax
57 Deconf
58 Delight
59 Deriv
60 Digitalsellz
61 Discourse
62 Django
63 Doppler
64 Drchrono
65 Drive
66 Dropcontact
67 Drugs
68 Duckduckgo
69 Dynatrace
70 Ed
71 Elastic
72 Endless group
73 Enjin
74 Enter
75 Equifax vdp
76 Evernote
77 Exness
78 Exodus
79 Expedia group bug bounty
80 Expressionengine
81 Fanduel
82 Fastify
83 Fastly vdp
84 Fetlife
85 Figma
86 Files
87 Filezilla
88 Flickr
89 Ford
90 Forescout technologies
91 Formassembly
92 Frans visits vegas
93 Frontegg
94 Gatecoin
95 Gener8
96 General motors
97 Github
98 Github security lab
99 Gitlab
100 Glassdoor
101 Glasswire
102 Glovo
103 Gocd
104 Grab
105 Grammarly
106 Gratipay
107 Greenhouse
108 Gsa bounty
109 Gymshark
110 H1 5411 ctf
111 H1 ctf
112 Hackerone
113 Hanno
114 Helium
115 Hiro
116 Homebrew
117 Hostinger
118 Hyperledger
119 Ian dunn
120 Ibm
121 Imgur
122 Impresscms
123 Indrive
124 Inflection
125 Infogram
126 Informatica
127 Instacart
128 Insulet corporation
129 Internet bug bounty
130 Invision power services
131 Ionity gmbh
132 Irccloud
133 Jamieweb
134 Jetblue
135 Judge
136 Kartpay
137 Kaspersky
138 Kayak
139 Khan academy
140 Kindred group
141 Krisp
142 Kubernetes
143 Lab45
144 Lacework
145 Lark technologies
146 Legal robot
147 Lemlist
148 Liberapay
149 Libsass
150 Linkedin
151 Linktree
152 Localize
153 Localtapiola
154 Logitech
155 Ly corporation
156 Lyst
157 Magic
158 Mapbox
159 Maplogin
160 Mapsmarker
161 Mariadb
162 Mars
163 Mattermost
164 Mavenlink
165 Mcuboot
166 Mendix
167 Mercadolibre
168 Meredith
169 Meta
170 Metamask
171 Midpoint european commission digit
172 Mixmax
173 Mobisystems ltd
174 Monero
175 Moneybird
176 Mozilla
177 Mtn group
178 Mycrypto
179 Myetherwallet
180 Myndr
181 Nextcloud
182 Nintendo
183 Node
184 Node
185 Nord security
186 Notepad
187 Nuri
188 Nutanix
189 Ok
190 Olx
191 Omise
192 On
193 Oneweb
194 Openmage
195 Owncloud
196 Owox
197 Ozon
198 Palantir public
199 Palo alto software
200 Panther labs
201 Paragon initiative enterprises
202 Parrot sec
203 Paypal
204 People interactive
205 Phabricator
206 Phpbb
207 Picsart
208 Ping identity
209 Pixiv
210 Playstation
211 Portswigger web security
212 Priceline
213 Proctorio
214 Pubg
215 Publitas
216 Pushwoosh
217 Putty european commission digit
218 Python cryptographic authority
219 Quantopian
220 Quora
221 R3
222 Radancy
223 Railto llc
224 Ratelimited
225 Rbkmoney
226 Recorded future
227 Reddit
228 Reverb
229 Revive adserver
230 Rghost
231 Roblox
232 Rocket
233 Rockset
234 Rockstar games
235 Rootstock labs
236 Ruby
237 Ruby on rails
238 Rubygems
239 S pankki
240 Secnews
241 Securityscorecard
242 Semmle
243 Semrush
244 Sheer
245 Shipt
246 Shopify
247 Shopify scripts
248 Sidefx
249 Sifchain
250 Skale network
251 Skyliner
252 Slack
253 Smartsheet
254 Smtp2go
255 Smtp2go bbp
256 Smule
257 Snapchat
258 Sony
259 Sorare
260 Square open source
261 Staging
262 Starbucks
263 Stellar
264 Stopthehacker
265 Stripe
266 Stripo inc
267 Tennessee valley authority
268 Teradici
269 Thisdata
270 Tiktok
271 Tools for humanity
272 Top echelon software
273 Tor
274 Traffic factory
275 Trellix
276 Trint ltd
277 Twitter algorithmic bias
278 U
279 U
280 U
281 Uber
282 Ubiquiti inc
283 Udemy
284 Unikrn
285 Upchieve
286 Ups vdp
287 Upserve
288 Urban company
289 Urban dictionary
290 Valve
291 Vend vdp
292 Veris
293 Vimeo
294 Vk
295 Vlc european commission digit
296 Vulners
297 Wakatime
298 Weblate
299 Websummit
300 Whisper
301 Who covid 19 mobile app
302 Wordpress
303 Wp api
304 X formerly twitter
305 Xiaomi
306 Xvideos
307 Y combinator
308 Yahoo
309 Yelp
310 Yoti
311 Zaption
312 Zego
313 Zendesk
314 Zenly
315 Zomato

Releases

No releases published

Packages

No packages published

Languages