-
Notifications
You must be signed in to change notification settings - Fork 40
/
hackerone-one-million-reports
3522 lines (3522 loc) · 339 KB
/
hackerone-one-million-reports
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
https://hackerone.com/reports/120 | Missing SPF for hackerone.com
https://hackerone.com/reports/280 | Real impersonation
https://hackerone.com/reports/284 | Broken Authentication and session management OWASP A2
https://hackerone.com/reports/288 | Session Management
https://hackerone.com/reports/298 | RTL override symbol not stripped from file names
https://hackerone.com/reports/321 | CSP not consistently applied
https://hackerone.com/reports/353 | Session not expired on logout
https://hackerone.com/reports/390 | Pixel flood attack
https://hackerone.com/reports/400 | GIF flooding
https://hackerone.com/reports/454 | PNG compression DoS
https://hackerone.com/reports/477 | Flawed account creation process allows registration of usernames corresponding to existing file names
https://hackerone.com/reports/487 | DNS Cache Poisoning
https://hackerone.com/reports/499 | Ruby: Heap Overflow in Floating Point Parsing
https://hackerone.com/reports/500 | OpenSSH: Memory corruption in AES-GCM support
https://hackerone.com/reports/501 | TLS Virtual Host Confusion
https://hackerone.com/reports/523 | PHP openssl_x509_parse() Memory Corruption Vulnerability
https://hackerone.com/reports/546 | Logical issues with account settings
https://hackerone.com/reports/547 | CSRF login
https://hackerone.com/reports/575 | Email spoofing
https://hackerone.com/reports/713 | Upload profile photo from URL
https://hackerone.com/reports/727 | Switching the user to the attacker's account
https://hackerone.com/reports/737 | Improper session management
https://hackerone.com/reports/738 | Information disclosure (reset password token) and changing the user's password
https://hackerone.com/reports/742 | A password reset page does not properly validate the authenticity token at the server side.
https://hackerone.com/reports/774 | Log in a user to another account
https://hackerone.com/reports/809 | Improperly implemented password recovery link functionality
https://hackerone.com/reports/842 | Autocomplete enabled in Paypal preferences
https://hackerone.com/reports/1356 | PHP Heap Overflow Vulnerability in imagecrop()
https://hackerone.com/reports/1509 | DNS Misconfiguration
https://hackerone.com/reports/2106 | Flash type confusion vulnerability leads to code execution
https://hackerone.com/reports/2107 | Handling of jar: URIs bypasses AllowScriptAccess=never
https://hackerone.com/reports/2140 | Flash local-with-fileaccess Sandbox Bypass
https://hackerone.com/reports/2170 | Flash double free vulnerability leads to code execution
https://hackerone.com/reports/2221 | CSS leaks SCSS debug info
https://hackerone.com/reports/2224 | Bypass auth.email-domains
https://hackerone.com/reports/2228 | Login CSRF using Twitter OAuth
https://hackerone.com/reports/2233 | Bypass auth.email-domains (2)
https://hackerone.com/reports/2421 | Value of JSESSIONID and XSRF token parameter in cookie remains same before and after login
https://hackerone.com/reports/2427 | XSRF token problem
https://hackerone.com/reports/2439 | Cross Site Scripting (XSS) - app.relateiq.com
https://hackerone.com/reports/2497 | Reflective XSS can be triggered in IE
https://hackerone.com/reports/2559 | Broken Authentication (including Slack OAuth bugs)
https://hackerone.com/reports/2575 | Slack OAuth2 "redirect_uri" Bypass
https://hackerone.com/reports/2584 | Weird Bug - Ability to see partial of other user's notification
https://hackerone.com/reports/2617 | Stored XSS in www.slack-files.com
https://hackerone.com/reports/2622 | URL redirection flaw
https://hackerone.com/reports/2625 | Stored XSS in username.slack.com
https://hackerone.com/reports/2628 | CSRF vulnerability on https://sehacure.slack.com/account/settings
https://hackerone.com/reports/2652 | Stored XSS in Channel Chat
https://hackerone.com/reports/2735 | HTML injection in "Invite Collaborators"
https://hackerone.com/reports/2777 | Reflected Xss
https://hackerone.com/reports/3227 | Control Characters Not Stripped From Username on Signup
https://hackerone.com/reports/3356 | UnAuthorized Editorial Publishing to Blogs
https://hackerone.com/reports/3370 | Directory traversal attack in view resolver
https://hackerone.com/reports/3441 | Captcha Bypass With Extension
https://hackerone.com/reports/3455 | flash content type sniff vulnerability in api.slack.com
https://hackerone.com/reports/3596 | OAuth access_token stealing in Phabricator
https://hackerone.com/reports/3921 | Control character allowed in username
https://hackerone.com/reports/3930 | OAuth Stealing Attack (New)
https://hackerone.com/reports/3986 | Securing sensitive pages from SearchBots
https://hackerone.com/reports/4114 | Persistent XSS: Editor link
https://hackerone.com/reports/4409 | TRACE disclosure attack may be possible
https://hackerone.com/reports/4561 | Stored XSS in Slackbot Direct Messages
https://hackerone.com/reports/4638 | Duplicate of #4550
https://hackerone.com/reports/4689 | SPDY memory corruption
https://hackerone.com/reports/4690 | SPDY heap buffer overflow
https://hackerone.com/reports/5314 | Coinbase Android Application - Bitcoin Wallet Leaks OAuth Response Code
https://hackerone.com/reports/5786 | Coinbase Android Security Vulnerabilities
https://hackerone.com/reports/5928 | Uncontrolled Resource Consumption with XMPP-Layer Compression
https://hackerone.com/reports/5933 | Multiple Issues related to registering applications
https://hackerone.com/reports/5946 | Marking notifications as read CSRF bug
https://hackerone.com/reports/6002 | Stored XSS in Slack.com
https://hackerone.com/reports/6017 | Facebook Takeover using Slack using 302 from files.slack.com with access_token
https://hackerone.com/reports/6350 | creating titleless and non-closable bugs
https://hackerone.com/reports/6353 | Wildcard DNS in website
https://hackerone.com/reports/6380 | Same Origin Security Bypass Vulnerability
https://hackerone.com/reports/6389 | Integer overflow in strop.expandtabs
https://hackerone.com/reports/6626 | TLS heartbeat read overrun
https://hackerone.com/reports/6871 | Login CSRF
https://hackerone.com/reports/6872 | Sign up CSRF
https://hackerone.com/reports/6877 | Unsecure cookies, cookie flag secure not set
https://hackerone.com/reports/6883 | Bruteforcing irccloud login
https://hackerone.com/reports/6884 | Leaking Referrer in Reset Password Link
https://hackerone.com/reports/6907 | Session Token is not Verified while changing Account Setting's which Result In account Takeover
https://hackerone.com/reports/6910 | Full account takeover using CSRF and password reset
https://hackerone.com/reports/6935 | Missing X-Content-Type-Options
https://hackerone.com/reports/7036 | Bug in iOS application which could lead to unauthorised access.
https://hackerone.com/reports/7041 | iOS application does not destroy session upon logout.
https://hackerone.com/reports/7121 | Persistent Cross Site Scripting within the IRCCloud Pastebin
https://hackerone.com/reports/7277 | TLS Triple Handshake Attack
https://hackerone.com/reports/7357 | Host Header is not validated resulting in Open Redirect
https://hackerone.com/reports/7369 | 2 factor authentication design flaw
https://hackerone.com/reports/7441 | Dangerous Persistent xss
https://hackerone.com/reports/7531 | Login CSRF can be bypassed (Similar approach to previous one).
https://hackerone.com/reports/7803 | Security bypass could lead to information disclosure
https://hackerone.com/reports/7931 | Issue with remember_user_token
https://hackerone.com/reports/8082 | Password Reset Bug
https://hackerone.com/reports/8724 | Clickjacking
https://hackerone.com/reports/8846 | localStorage не чиÑтитÑÑ Ğ¿Ğ¾Ñле выхода
https://hackerone.com/reports/9318 | Home page reflected XSS
https://hackerone.com/reports/9375 | Stored XSS in all fields in Basic Google Maps Placemarks Settings
https://hackerone.com/reports/9391 | Xss in CampTix Event Ticketing
https://hackerone.com/reports/9479 | Anti-MIME-Sniffing header X-Content-Type-Options header has not been set.
https://hackerone.com/reports/9774 | Stored XSS Found
https://hackerone.com/reports/9919 | SQL injection [дырка в движке форума]
https://hackerone.com/reports/9921 | Time based sql injection
https://hackerone.com/reports/10037 | SQL inj
https://hackerone.com/reports/10081 | SQL
https://hackerone.com/reports/10297 | Stored XSS in slack.com (integrations)
https://hackerone.com/reports/10373 | Bypassing Same Origin Policy With JSONP APIs and Flash
https://hackerone.com/reports/10468 | SQL inj
https://hackerone.com/reports/10554 | Bypassing 2FA for BTC transfers
https://hackerone.com/reports/10563 | CSRF on "Set as primary" option on the accounts page
https://hackerone.com/reports/10829 | CSRF in function "Set as primary" on accounts page
https://hackerone.com/reports/11073 | XSS in gist integration
https://hackerone.com/reports/11410 | XSS in https://e.mail.ru/cgi-bin/lstatic (Limited use)
https://hackerone.com/reports/11861 | SQL injection update.mail.ru
https://hackerone.com/reports/11919 | Stored XSS on http://top.mail.ru
https://hackerone.com/reports/11927 | Stored XSS on http://cards.mail.ru
https://hackerone.com/reports/12297 | Python vulnerability: reading arbitrary process memory
https://hackerone.com/reports/12497 | Adobe Flash Player FileReference Use-after-Free Vulnerability
https://hackerone.com/reports/12583 | XXE and SSRF on webmaster.mail.ru
https://hackerone.com/reports/12588 | XSS in a file or folder name
https://hackerone.com/reports/13195 | auth.mail.ru: XSS in login form
https://hackerone.com/reports/13286 | Host Header Injection - irccloud.com
https://hackerone.com/reports/13748 | Potential denial of service in hackerone.com/teams/new
https://hackerone.com/reports/13959 | privilege escalation
https://hackerone.com/reports/14033 | connect.mail.ru: SSRF
https://hackerone.com/reports/14127 | SSRF on https://whitehataudit.slack.com/account/photo
https://hackerone.com/reports/14570 | Login password guessing attack
https://hackerone.com/reports/14631 | Clickjacking at https://www.mavenlink.com/ main website
https://hackerone.com/reports/15166 | Password reset token not expiring
https://hackerone.com/reports/15362 | Flash Sandbox Bypass
https://hackerone.com/reports/15412 | Leaking CSRF token over HTTP resulting in CSRF protection bypass
https://hackerone.com/reports/15762 | SQL Injection on 11x11.mail.ru
https://hackerone.com/reports/15785 | Session not invalidated after password reset
https://hackerone.com/reports/15852 | Non Validation of session after password reset
https://hackerone.com/reports/16315 | Abusing VCS control on phabricator
https://hackerone.com/reports/16330 | Multiple issues in looking-glass software (aka from web to BGP injections)
https://hackerone.com/reports/16392 | Abusing daemon logs for Privilege escalation under certain scenarios
https://hackerone.com/reports/16568 | Failed Certificate Validation On Custom Server (Register)
https://hackerone.com/reports/16571 | SSRF (Portscan) via Register Function (Custom Server)
https://hackerone.com/reports/16718 | Open Redirect login account
https://hackerone.com/reports/16935 | e.mail.ru: SMS spam with custom content
https://hackerone.com/reports/17160 | Password Policy issue (Weak Protect)
https://hackerone.com/reports/17383 | Category- Broken Authentication and Session Management (leads to account compromise if some conditions are met)
https://hackerone.com/reports/17474 | Broken Authentication and Session Management
https://hackerone.com/reports/17540 | Reflected XSS in Pastebin-view
https://hackerone.com/reports/17688 | LZ4 Core
https://hackerone.com/reports/17785 | Denial of Service
https://hackerone.com/reports/18691 | XSS in editor by any user
https://hackerone.com/reports/18698 | Resubmitted with POC #18685 Password reset CSRF
https://hackerone.com/reports/18843 | use-after-free vulnerability in Flash Player
https://hackerone.com/reports/18992 | Possibility to attach any mobile number to any email
https://hackerone.com/reports/20049 | Cross-site Scripting in mailing (username)
https://hackerone.com/reports/20391 | m.agent.mail.ru: Подделываем j2me app-descriptor
https://hackerone.com/reports/20616 | e.mail.ru: File upload "Chapito" circus
https://hackerone.com/reports/20671 | integer overflow in 'buffer' type allows reading memory
https://hackerone.com/reports/20720 | cloud.mail.ru: File upload XSS using Content-Type header
https://hackerone.com/reports/20861 | moderate: mod_deflate denial of service
https://hackerone.com/reports/20873 | rsync hash collisions may allow an attacker to corrupt or modify files
https://hackerone.com/reports/21034 | Invoice Details activate JS that filled in
https://hackerone.com/reports/21069 | Login CSRF
https://hackerone.com/reports/21110 | Clickjacking
https://hackerone.com/reports/21150 | Flash XSS on swfupload.swf showing at app.mavenlink.com
https://hackerone.com/reports/21210 | privilege escalation
https://hackerone.com/reports/21248 | Content spoofing at Stripe Integrations
https://hackerone.com/reports/22093 | Content Spoofing all Integrations in https://team.slack.com/services/new/
https://hackerone.com/reports/23363 | Forgot Password Issue
https://hackerone.com/reports/23386 | Redirect while opening links in new tabs
https://hackerone.com/reports/23852 | money.mail.ru: Странное поведение SMS
https://hackerone.com/reports/25160 | Open redirection on secure.phabricator.com
https://hackerone.com/reports/25281 | Change Any username and profile link in hackerone
https://hackerone.com/reports/26647 | CSRF protection bypass on any Django powered site via Google Analytics
https://hackerone.com/reports/26825 | Full path disclosure at ads.twitter.com
https://hackerone.com/reports/26935 | XSS via .eml file
https://hackerone.com/reports/26962 | open redirect in rfc6749
https://hackerone.com/reports/27166 | Missing Rate Limiting on https://twitter.com/account/complete
https://hackerone.com/reports/27404 | Delete Credit Cards from any Twitter Account in ads.twitter.com [New Vulnerability]
https://hackerone.com/reports/27511 | ads.twitter.com xss
https://hackerone.com/reports/27651 | Flash Local Sandbox Bypass
https://hackerone.com/reports/27846 | Stored xss
https://hackerone.com/reports/27987 | Window Opener Property Bug
https://hackerone.com/reports/28150 | Cross site scripting on ads.twitter.com
https://hackerone.com/reports/28445 | SPL ArrayObject/SPLObjectStorage Unserialization Type Confusion Vulnerabilities
https://hackerone.com/reports/28449 | Active Record SQL Injection Vulnerability Affecting PostgreSQL
https://hackerone.com/reports/28450 | Active Record SQL Injection Vulnerability Affecting PostgreSQL
https://hackerone.com/reports/28500 | iOS App can establish Facetime calls without user's permission
https://hackerone.com/reports/28832 | touch.mail.ru XSS via message id
https://hackerone.com/reports/28865 | Redirect FILTER bypass in report/comment
https://hackerone.com/reports/29234 | Credit Card Validation Issue
https://hackerone.com/reports/29328 | XSS platform.twitter.com
https://hackerone.com/reports/29331 | No email verification on username change
https://hackerone.com/reports/29360 | XSS platform.twitter.com | video-js metadata
https://hackerone.com/reports/29480 | Unvalidated Channel names causes IRC Command Injection
https://hackerone.com/reports/29491 | homograph attack. IDNs displayed in unicode in bug reports and on external link warning page
https://hackerone.com/reports/29835 | Profile Pic padding (Length-hiding) fails due to use of GZIP
https://hackerone.com/reports/29839 | GNU Bourne-Again Shell (Bash) 'Shellshock' Vulnerability
https://hackerone.com/reports/30238 | New Device confirmation tokens are not properly validated.
https://hackerone.com/reports/30567 | Adobe Flash Player MP4 Use-After-Free Vulnerability
https://hackerone.com/reports/30852 | Relateiq SSLv3 deprecated protocol vulnerability.
https://hackerone.com/reports/30975 | Improper Verification of email address while saving Account Settings
https://hackerone.com/reports/31082 | Unauthorized Tweeting on behalf of Account Owners
https://hackerone.com/reports/31168 | Cryptographic Side Channel in OAuth Library
https://hackerone.com/reports/31383 | Ability to see common response titles of other teams (limited)
https://hackerone.com/reports/31408 | Adobe Flash Player Out-of-Bound Read/Write Vulnerability
https://hackerone.com/reports/31415 | PoodleBleed
https://hackerone.com/reports/31554 | Singup Page HTML Injection Vulnerability
https://hackerone.com/reports/31756 | Drupal 7 pre auth sql injection and remote code execution
https://hackerone.com/reports/32519 | XSS in fabric.io
https://hackerone.com/reports/32570 | OpenSSL HeartBleed (CVE-2014-0160)
https://hackerone.com/reports/32825 | URGENT - Subdomain Takeover on media.vine.co due to unclaimed domain pointing to AWS
https://hackerone.com/reports/33018 | a stored xss in slack integration https://onerror.slack.com/services/import
https://hackerone.com/reports/33091 | DOM Cross-Site Scripting ( XSS )
https://hackerone.com/reports/33935 | File Name Enumeration
https://hackerone.com/reports/34084 | Bad extended ascii handling in HTTP 301 redirects of t.co
https://hackerone.com/reports/34112 | SMPT Protection not used, I can hijack your email server.
https://hackerone.com/reports/34686 | Ğшибка фильтрации
https://hackerone.com/reports/34725 | XSS via Fabrico Account Name
https://hackerone.com/reports/35102 | Locale::parseLocale Double Free
https://hackerone.com/reports/35237 | Gain reputation by creating a duplicate of an existing report
https://hackerone.com/reports/35287 | getting emails of users/removing them from victims account [using typical attack]
https://hackerone.com/reports/35363 | [static.qiwi.com] XSS proxy.html
https://hackerone.com/reports/35413 | [send.qiwi.ru] XSS at auth?login=
https://hackerone.com/reports/36105 | CRLF Injection [ishop.qiwi.com]
https://hackerone.com/reports/36211 | Logic Issue with Reputation: Boost Reputation Points
https://hackerone.com/reports/36264 | mod_proxy_fcgi buffer overflow
https://hackerone.com/reports/36279 | Adobe Flash Player MP4 Use-After-Free Vulnerability
https://hackerone.com/reports/36319 | [qiwi.com] /oauth/confirm.action XSS
https://hackerone.com/reports/36450 | [send.qiwi.ru] Soap-based XXE vulnerability /soapserver/
https://hackerone.com/reports/36594 | New Device Confirmation, token is valid until not used.
https://hackerone.com/reports/36986 | [Stored XSS] vine.co - profile page
https://hackerone.com/reports/37240 | Race condition in Flash workers may cause an exploitabl​e double free
https://hackerone.com/reports/38007 | Subdomain Takeover using blog.greenhouse.io pointing to Hubspot
https://hackerone.com/reports/38157 | [qiwi.com] Open Redirect
https://hackerone.com/reports/38170 | Misc Python bugs (Memory Corruption & Use After Free)
https://hackerone.com/reports/38189 | xss in /browse/contacts/
https://hackerone.com/reports/38232 | Breaking Bugs as team member
https://hackerone.com/reports/38343 | Issue with password change
https://hackerone.com/reports/38345 | [sms.qiwi.ru] XSS via Request-URI
https://hackerone.com/reports/38615 | [connect.mail.ru] Memory Disclosure / IE XSS
https://hackerone.com/reports/38965 | Phabricator Diffusion application allows unauthorized users to delete mirrors
https://hackerone.com/reports/39181 | [vimeopro.com] CRLF Injection
https://hackerone.com/reports/39428 | Phabricator Phame Blog Skins Local File Inclusion
https://hackerone.com/reports/39486 | No bruteforce protection leads to enumeration of emails in http://e.mail.ru/
https://hackerone.com/reports/39631 | Open redirection in fabric.io
https://hackerone.com/reports/41240 | POODLE Bug: 199.16.156.44, 199.16.156.108, mx4.twitter.com
https://hackerone.com/reports/41469 | Error stack trace
https://hackerone.com/reports/41758 | Stored XSS in api key of operator wallet
https://hackerone.com/reports/41856 | HTML/XSS rendered in Android App of Crashlytics through fabric.io
https://hackerone.com/reports/42161 | stored xss in transaction
https://hackerone.com/reports/42236 | URGENT - Subdomain Takeover on users.tweetdeck.com , the same issue of report #32825
https://hackerone.com/reports/42240 | chrome allows POST requests with custom headers using flash + 307 redirect
https://hackerone.com/reports/42393 | XSS on partners.uber.com
https://hackerone.com/reports/42582 | Vimeo.com - Reflected XSS Vulnerability
https://hackerone.com/reports/42584 | Vimeo.com - reflected xss vulnerability
https://hackerone.com/reports/42587 | Vimeo.com Insecure Direct Object References Reset Password
https://hackerone.com/reports/42702 | APIs for channels allow HTML entities that may cause XSS issue
https://hackerone.com/reports/42797 | Denial of Service in Action Pack Exception Handling
https://hackerone.com/reports/42961 | fabric.io - app member can make himself an admin
https://hackerone.com/reports/43065 | Fabric.io - an app admin can delete team members from other user apps
https://hackerone.com/reports/43440 | Arbitrary file existence disclosure in Action Pack
https://hackerone.com/reports/43443 | PyUnicode_FromFormatV crasher
https://hackerone.com/reports/43602 | Buying ondemand videos that 0.1 and sometimes for free
https://hackerone.com/reports/43617 | Adding profile picture to anyone on Vimeo
https://hackerone.com/reports/43672 | player.vimeo.com - Reflected XSS Vulnerability
https://hackerone.com/reports/43770 | Ability to Download Music Tracks Without Paying (Missing permission check on`/musicstore/download`)
https://hackerone.com/reports/43850 | abusing Thumbnails(https://vimeo.com/upload/select_thumb) to see a private video
https://hackerone.com/reports/43988 | twitter android app Fragment Injection
https://hackerone.com/reports/43998 | CRITICAL full source code/config disclosure for Cameo
https://hackerone.com/reports/44052 | Hadoop Node available to public
https://hackerone.com/reports/44146 | Make API calls on behalf of another user (CSRF protection bypass)
https://hackerone.com/reports/44217 | Application XSS filter function Bypass may allow Multiple stored XSS
https://hackerone.com/reports/44294 | Heartbleed: my.com (185.30.178.33) port 1433
https://hackerone.com/reports/44492 | Flaw in login with twitter to steal Oauth tokens
https://hackerone.com/reports/44512 | XSS on any site that includes the moogaloop flash player | deprecated embed code
https://hackerone.com/reports/44513 | RCE due to Web Console IP Whitelist bypass in Rails 4.0 and 4.1
https://hackerone.com/reports/44727 | Insecure Data Storage in Vine Android App
https://hackerone.com/reports/44798 | Vimeo Search - XSS Vulnerability [http://vimeo.com/search]
https://hackerone.com/reports/44888 | Improper way of validating a program
https://hackerone.com/reports/45368 | ftp upload of video allows naming that is not sanitized as the manual naming
https://hackerone.com/reports/45484 | XSS on Vimeo
https://hackerone.com/reports/45960 | CRITICAL vulnerability - Insecure Direct Object Reference - Unauthorized access to `Videos` of Channel whose privacy is set to `Private`.
https://hackerone.com/reports/46072 | Vulnerability with the way \ escaped characters in <http://danlec.com> style links are rendered
https://hackerone.com/reports/46113 | Can message users without the proper authorization
https://hackerone.com/reports/46345 | Directory index and information disclosure
https://hackerone.com/reports/46366 | Error stack trace
https://hackerone.com/reports/46397 | Insecure Direct Object Reference vulnerability
https://hackerone.com/reports/46429 | Team member invitations to sandboxed teams are not invalidated consistently
https://hackerone.com/reports/46485 | Problem with OAuth
https://hackerone.com/reports/46618 | Frictionless Transferring of Wallet Ownership
https://hackerone.com/reports/46747 | Team admin can change unauthorized team setting (require_at_for_mention)
https://hackerone.com/reports/46750 | Team admin can change unauthorized team setting (allow_message_deletion)
https://hackerone.com/reports/46818 | Twitter Card - Parent Window Redirection
https://hackerone.com/reports/46916 | Markdown parsing issue enables insertion of malicious tags and event handlers
https://hackerone.com/reports/47012 | Adobe Flash Player Out-of-Bound Access Vulnerability
https://hackerone.com/reports/47227 | Race condition in workers may cause an exploitable double free by abusing bytearray.compress()
https://hackerone.com/reports/47232 | Use after free during the StageVideoAvailabilityEvent can result in arbitrary code execution
https://hackerone.com/reports/47234 | Use After Free in Flash MessageChannel.send can cause arbitrary code execution
https://hackerone.com/reports/47280 | JSON keys are not properly escaped
https://hackerone.com/reports/47472 | CSP Bypass: Click handler for links with data-method="post" can cause authenticity_token to be sent off domain
https://hackerone.com/reports/47495 | Same Origin Policy bypass
https://hackerone.com/reports/47536 | [ishop.qiwi.com] XSS + Misconfiguration
https://hackerone.com/reports/47627 | Email Enumeration (POC)
https://hackerone.com/reports/47779 | Heap overflow in H. Spencer’s regex library on 32 bit systems
https://hackerone.com/reports/47888 | Reporting user's profile by using another people's ID
https://hackerone.com/reports/47940 | Team admin can add billing contacts
https://hackerone.com/reports/48065 | open authentication bug
https://hackerone.com/reports/48100 | Bad Write in TTF font parsing (win32k.sys)
https://hackerone.com/reports/48422 | Team member invitations to sandboxed teams are not invalidated consistently (v2)
https://hackerone.com/reports/48516 | Redirect URL in /intent/ functionality is not properly escaped
https://hackerone.com/reports/49035 | HDFS NameNode Public disclosure: http://185.5.139.33:50070/dfshealth.jsp
https://hackerone.com/reports/49139 | scfbp.tng.mail.ru: Heartbleed
https://hackerone.com/reports/49170 | Information disclosure - emails disclosed in response > staging.seatme.us
https://hackerone.com/reports/49408 | RCE через JDWP
https://hackerone.com/reports/49561 | Vimeo + & Vimeo PRO Unautorised Tax bypass
https://hackerone.com/reports/49652 | Improperly validated fields allows injection of arbitrary HTML via spoofed React objects
https://hackerone.com/reports/49663 | URGENT - Subdomain Takeover on status.vimeo.com due to unclaimed domain pointing to statuspage.io
https://hackerone.com/reports/49759 | Open Redirect leak of authenticity_token lead to full account take over.
https://hackerone.com/reports/49806 | Twitter Ads Campaign information disclosure through admin without any authentication.
https://hackerone.com/reports/49935 | rails-ujs will send CSRF tokens to other origins
https://hackerone.com/reports/49974 | The csrf token remains same after user logs in
https://hackerone.com/reports/50134 | XSS in original referrer after follow
https://hackerone.com/reports/50170 | FREAK: Factoring RSA_EXPORT Keys to Impersonate TLS Servers
https://hackerone.com/reports/50752 | open redirect sends authenticity_token to any website or (ip address)
https://hackerone.com/reports/50776 | A user can edit comments even after video comments are disabled
https://hackerone.com/reports/50786 | A user can add videos to other user's private groups
https://hackerone.com/reports/50829 | A user can post comments on other user's private videos
https://hackerone.com/reports/50884 | Bypass pin(4 digit passcode on your android app)
https://hackerone.com/reports/50885 | CVE-2014-0224 openssl ccs vulnerability
https://hackerone.com/reports/50941 | A user can enhance their videos with paid tracks without buying the track
https://hackerone.com/reports/51265 | Flash Cross Domain Policy Bypass by Using File Upload and Redirection - only in Chrome
https://hackerone.com/reports/51817 | Post in private groups after getting removed
https://hackerone.com/reports/52035 | Open redirect in "Language change".
https://hackerone.com/reports/52042 | HTTP Response Splitting (CRLF injection) in report_story
https://hackerone.com/reports/52176 | Insecure Direct Object References in https://vimeo.com/forums
https://hackerone.com/reports/52181 | Insecure Direct Object References that allows to read any comment (even if it should be private)
https://hackerone.com/reports/52635 | UniFi v3.2.10 Cross-Site Request Forgeries / Referer-Check Bypass
https://hackerone.com/reports/52646 | Insecure direct object reference - have access to deleted DM's
https://hackerone.com/reports/52707 | Invite any user to your group without even following him
https://hackerone.com/reports/52708 | Share your channel to any user on vimeo without following him
https://hackerone.com/reports/52822 | XSS with Time-of-Day Format
https://hackerone.com/reports/52982 | [URGENT ISSUE] Add or Delete the videos in watch later list of any user .
https://hackerone.com/reports/53004 | Blacklist bypass on Callback URLs
https://hackerone.com/reports/53088 | SSRF vulnerability (access to metadata server on EC2 and OpenStack)
https://hackerone.com/reports/53098 | XSS in twitter.com/safety/unsafe_link_warning
https://hackerone.com/reports/53843 | HTTP Response Splitting (CRLF injection) due to headers overflow
https://hackerone.com/reports/53858 | Insecure Direct Object Reference - access to other user/group DM's
https://hackerone.com/reports/54094 | HTTP MitM on Flash Player settings manager allows attacker to set sandbox settings
https://hackerone.com/reports/54321 | Xss in website's link
https://hackerone.com/reports/54327 | Persistent cross-site scripting (XSS) in map attribution
https://hackerone.com/reports/54610 | Logout any user of same team
https://hackerone.com/reports/54631 | Vulnerable to JavaScript injection. (WXS) (Javascript injection)!
https://hackerone.com/reports/54641 | Captcha Bypass in Snapchat's Geofilter Submission Process
https://hackerone.com/reports/54719 | e.mail.ru stored XSS in agent via sticker (smile)
https://hackerone.com/reports/54733 | Sandboxed iframes don't show confirmation screen
https://hackerone.com/reports/54779 | Missing spf flags for myshopify.com
https://hackerone.com/reports/55017 | Multiple Python integer overflows
https://hackerone.com/reports/55018 | Segmentation fault for invalid PSS parameters
https://hackerone.com/reports/55028 | Free called on unitialized pointer in exif.c
https://hackerone.com/reports/55029 | Use after free vulnerability in unserialize() with DateTimeZone
https://hackerone.com/reports/55030 | SoapClient's __call() type confusion through unserialize()
https://hackerone.com/reports/55033 | Use after free vulnerability in unserialize()
https://hackerone.com/reports/55140 | Race Conditions in OAuth 2 API implementations
https://hackerone.com/reports/55431 | XML Parser Bug: XXE over which leads to RCE
https://hackerone.com/reports/55525 | Open redirection in OAuth
https://hackerone.com/reports/55530 | Authentication Failed Mobile version
https://hackerone.com/reports/55546 | Open Redirect after login at http://ecommerce.shopify.com
https://hackerone.com/reports/55670 | Fabric.io: Ex-admin of an organization can delete team members
https://hackerone.com/reports/55716 | Force 500 Internal Server Error on any shop (for one user)
https://hackerone.com/reports/55842 | [persistent cross-site scripting] customers can target admins
https://hackerone.com/reports/55911 | CSRF token fixation in facebook store app that can lead to adding attacker to victim acc
https://hackerone.com/reports/56002 | Shopify android client all API request's response leakage, including access_token, cookie, response header, response body content
https://hackerone.com/reports/56385 | Double free vulnerability in Flash Player Settings Manager (CVE-2015-0346)
https://hackerone.com/reports/56511 | IDOR expire other user sessions
https://hackerone.com/reports/56626 | Shop admin can change external login services
https://hackerone.com/reports/56742 | SPF whitelist of mandrill leads to email forgery
https://hackerone.com/reports/56779 | XSS on ecommerce.shopify.com
https://hackerone.com/reports/56828 | SSRF vulnerablity in app webhooks
https://hackerone.com/reports/56936 | Notification request disclose private information about other myshopify accounts
https://hackerone.com/reports/57163 | Open-redirect on hackerone.com
https://hackerone.com/reports/57356 | DOM based cookie bomb
https://hackerone.com/reports/57459 | XSS in experts.shopify.com
https://hackerone.com/reports/57603 | API: missing invalidation of OAuth2 Authorization Code during access revocation causes authorization bypass
https://hackerone.com/reports/57692 | Server responds with the server error logs on account creation
https://hackerone.com/reports/57764 | ByPassing the email Validation Email on Sign up process in mobile apps
https://hackerone.com/reports/57914 | HTML injection in email sent by romit.io
https://hackerone.com/reports/57918 | Insecure Local Data Storage : Application stores data using a binary sqlite database
https://hackerone.com/reports/58612 | Homograph attack
https://hackerone.com/reports/58630 | Content Spoofing
https://hackerone.com/reports/58679 | SSL cookie without secure flag set
https://hackerone.com/reports/59015 | Stored XSS in the Shopify Discussion Forums
https://hackerone.com/reports/59179 | Race condition when redeeming coupon codes
https://hackerone.com/reports/59356 | XSS in dropbox main domain
https://hackerone.com/reports/59369 | Making any Report Failed to load
https://hackerone.com/reports/59375 | Homograph attack
https://hackerone.com/reports/59469 | Fake URL + Additional vectors for homograph attack
https://hackerone.com/reports/59505 | Create and Update patients vulnerability
https://hackerone.com/reports/59508 | Accessing all appointments vulnerability
https://hackerone.com/reports/59659 | Reopen Disable Accounts/ Hidden Access After Disable
https://hackerone.com/reports/60016 | xss profile
https://hackerone.com/reports/60058 | teach.udemy.com log poison vulnerability through wordpress debug.log being publically available
https://hackerone.com/reports/60402 | Content Spoofing - External Link Warning Page
https://hackerone.com/reports/60573 | http://fitter1.i.mail.ru/browser/ торчит Graphite в мир
https://hackerone.com/reports/61312 | Bypass of the SSRF protection (Slack commands, Phabricator integration)
https://hackerone.com/reports/61367 | xss on autoserch
https://hackerone.com/reports/61371 | leak receipt of another user
https://hackerone.com/reports/62301 | Ability to add pishing links in discusion ," Bypassing uneductional Links add "
https://hackerone.com/reports/62400 | XSS on https://www.udemy.com/asset/export.html
https://hackerone.com/reports/62427 | XSS in myshopify.com Admin site in TAX Overrides
https://hackerone.com/reports/62531 | tt-mac.i.mail.ru: Quagga 0.99.23.1 (Router) : Default password and default enable password
https://hackerone.com/reports/62544 | http://tp-dev1.tp.smailru.net/
https://hackerone.com/reports/62778 | Multiple sub domain are vulnerable because of leaking full path
https://hackerone.com/reports/62861 | Bulk Discount App in myshopify.com exposes http://bulkdiscounts.shopifyapps.com vulnerable to XSS
https://hackerone.com/reports/63158 | External URL page bypass
https://hackerone.com/reports/63324 | Flash Player information disclosure (etc.) CVE-2015-3044, PSIRT-3298
https://hackerone.com/reports/63537 | XSS in https://app.mavenlink.com/workspaces/
https://hackerone.com/reports/63729 | Logic error with notifications: user that has left team continues to receive notifications and can not 'clean' this area on account
https://hackerone.com/reports/63865 | Potential denial of service in hackerone.com/<program>/reward_settings
https://hackerone.com/reports/63888 | Cross site scripting
https://hackerone.com/reports/64731 | Able to intercept app Traffic after choosing up the Secured Connection using SSL (HTTPS)
https://hackerone.com/reports/64963 | API: Bug in method auth.validatePhone
https://hackerone.com/reports/65013 | HTML Injection на e.mail.ru
https://hackerone.com/reports/65084 | Big Bug with Vault which i have already reported: Case #606962
https://hackerone.com/reports/65284 | Stored Cross-Site Scripting in Map Share Page
https://hackerone.com/reports/65330 | Ğе доÑÑ‚Ğ°Ñ‚Ğ¾Ñ‡Ğ½Ğ°Ñ Ğ¿Ñ€Ğ¾Ğ²ĞµÑ€ĞºĞ° логина Ñкайп
https://hackerone.com/reports/65729 | Activities are not Protected and able to crash app using other app (Can Malware or third parry app).
https://hackerone.com/reports/66121 | XSS at http://vk.com on IE using flash files
https://hackerone.com/reports/66151 | Invitation is not properly cancelled while inviting to bug reports.
https://hackerone.com/reports/66235 | Ğ£ÑзвимоÑÑ‚ÑŒ в Указание меÑÑ‚ на фото + фича + хакинг
https://hackerone.com/reports/66257 | [s.mail.ru] CRLF Injection
https://hackerone.com/reports/66262 | mailto: link injection on https://hackerone.com/directory
https://hackerone.com/reports/66386 | [www.*.myshopify.com] CRLF Injection
https://hackerone.com/reports/66962 | Misusing of FPU Instruction Could Cause Security Vulnerabilities in Adobe Flash Player
https://hackerone.com/reports/67125 | XSS at importing Product List
https://hackerone.com/reports/67132 | XSS at Bulk editing products
https://hackerone.com/reports/67161 | Possible xWork classLoader RCE: shared.mail.ru
https://hackerone.com/reports/67220 | Expire User Sessions in Admin Site does not expire user session in Shopify Application in IOS
https://hackerone.com/reports/67377 | SSRF via 'Add Image from URL' feature
https://hackerone.com/reports/67386 | [my.mail.ru] CRLF Injection
https://hackerone.com/reports/67389 | SSRF via 'Insert Image' feature of Products/Collections/Frontpage
https://hackerone.com/reports/67660 | Verification code issues for Two-Step Authentication
https://hackerone.com/reports/71614 | XSS in Myshopify Admin Site in DISCOUNTS
https://hackerone.com/reports/72243 | Publicly exposed SVN repository, ht.pornhub.com
https://hackerone.com/reports/72331 | XSS at Bulk editing ProductVariants
https://hackerone.com/reports/72785 | CSV Injection with the CVS export feature
https://hackerone.com/reports/73234 | out of bounds read crashes php-cgi
https://hackerone.com/reports/73235 | Use After Free Vulnerability in unserialize()
https://hackerone.com/reports/73236 | X509_to_X509_REQ NULL pointer deref
https://hackerone.com/reports/73237 | Buffer Over flow when parsing tar/zip/phar in phar_set_inode
https://hackerone.com/reports/73238 | Buffer Over-read in unserialize when parsing Phar
https://hackerone.com/reports/73239 | ZIP Integer Overflow leads to writing past heap boundary
https://hackerone.com/reports/73240 | Integer overflow in ftp_genlist() resulting in heap overflow
https://hackerone.com/reports/73241 | Malformed ECParameters causes infinite loop
https://hackerone.com/reports/73244 | Use after free vulnerability in unserialize() with DateInterval
https://hackerone.com/reports/73245 | Type Confusion Vulnerability in SoapClient
https://hackerone.com/reports/73246 | Use-after-free in php_curl related to CURLOPT_FILE/_INFILE/_WRITEHEADER
https://hackerone.com/reports/73247 | php_stream_url_wrap_http_ex() type-confusion vulnerability
https://hackerone.com/reports/73248 | Tokenizer crash when processing undecodable source code
https://hackerone.com/reports/73249 | Multiple use after free bugs in element module
https://hackerone.com/reports/73250 | Multiple use after free bugs in heapq module
https://hackerone.com/reports/73251 | Multiple use after free bugs in json encoding
https://hackerone.com/reports/73252 | Use after free in get_filter
https://hackerone.com/reports/73253 | Multiple type confusions in unicode error handlers
https://hackerone.com/reports/73255 | str_repeat() sign mismatch based memory corruption
https://hackerone.com/reports/73256 | PHP yaml_parse/yaml_parse_file/yaml_parse_url Double Free
https://hackerone.com/reports/73257 | PHP yaml_parse/yaml_parse_file/yaml_parse_url Unsafe Deserialization
https://hackerone.com/reports/73258 | Python: imageop Unsafe Arithmetic
https://hackerone.com/reports/73259 | Integer overflow in _pickle.c
https://hackerone.com/reports/73260 | Integer overflow in _json_encode_unicode leads to crash
https://hackerone.com/reports/73276 | Internet-based attacker can run Flash apps in local sandboxes by using special URL schemes (PSIRT-3299, CVE-2015-3079)
https://hackerone.com/reports/73491 | Buffer Overflow in PHP of the AirMax Products
https://hackerone.com/reports/73566 | Reflected XSS in chat
https://hackerone.com/reports/73567 | Attention! Remote Code Execution at http://wpt.ec2.shopify.com/
https://hackerone.com/reports/73808 | Extremely high Course rating values could be set in order to make really high Average rating of the course. Negative values could be set to.
https://hackerone.com/reports/74004 | Other Buffer Overflow in PHP of the AirMax Products
https://hackerone.com/reports/74025 | Yet another Buffer Overflow in PHP of the AirMax Products
https://hackerone.com/reports/74147 | Potential for financial loss, negative Values for "Buy fee" and "Sell Fee"
https://hackerone.com/reports/75357 | Session Cookie without HttpOnly and secure flag set
https://hackerone.com/reports/75556 | Accessing title of the report of which you are marked as duplicate
https://hackerone.com/reports/75702 | No rate limit which leads to "Users information Disclosure" including verfification documents etc.
https://hackerone.com/reports/75727 | Stored Cross site scripting In developer.zendesk.com
https://hackerone.com/reports/76307 | Self XSS Protection not used , I can trick users to insert JavaScript
https://hackerone.com/reports/76713 | XSS - Gallery Search Listing
https://hackerone.com/reports/76733 | Using GET method for account login with CSRF token leaking to external sites Via Referer.
https://hackerone.com/reports/76738 | Open redirect filter bypass
https://hackerone.com/reports/77060 | SMTP protection not used
https://hackerone.com/reports/77065 | Stealing CSRF Tokens
https://hackerone.com/reports/77067 | No rate limiting for sensitive actions (like "forgot password") enables user enumeration
https://hackerone.com/reports/77076 | GA code not verified on the server side allows sending Verification Documents on behalf of another user
https://hackerone.com/reports/77081 | Content Sniffing not disabled
https://hackerone.com/reports/77221 | Open/Unvalidated Redirect Issue
https://hackerone.com/reports/77231 | Weak Cryptographic Hash
https://hackerone.com/reports/77319 | Full path disclosure at https://keybase.io/_/api/1.0/invitation_request.json
https://hackerone.com/reports/77802 | TCP Source Port Pass Firewall
https://hackerone.com/reports/78052 | xss in group
https://hackerone.com/reports/78158 | Wrong Handling of Content-Type allows Flash injection and Rosseta flash patch bypass
https://hackerone.com/reports/78219 | Покупка пеÑни дешевле, чем она Ñтоит.
https://hackerone.com/reports/78253 | Покупка=>Ñкачка пеÑен, которые не предназначены Ğ´Ğ»Ñ Ğ¿Ñ€Ğ¾Ğ´Ğ°Ğ¶Ğ¸
https://hackerone.com/reports/78412 | Cross site scripting
https://hackerone.com/reports/78436 | (URGENT!) Покупка OK дешевле, чем он Ñтоит
https://hackerone.com/reports/78443 | Time-Based Blind SQL Injection Attacks
https://hackerone.com/reports/78516 | ДоÑтуп к чужим приватным фотографиÑм (3) через обложку видео
https://hackerone.com/reports/78765 | information disclosure
https://hackerone.com/reports/79046 | ДоÑтуп к чужим групповым беÑедам.
https://hackerone.com/reports/79185 | Content spoofing through Referel header
https://hackerone.com/reports/79348 | OSX slack:// protocol handler javascript injection
https://hackerone.com/reports/79393 | Ğткрытый доÑтуп к корпоративным данным.
https://hackerone.com/reports/79552 | [gratipay.com] CRLF Injection
https://hackerone.com/reports/80298 | Внедрение произвольного javascript-ÑÑ†ĞµĞ½Ğ°Ñ€Ğ¸Ñ Ğ² функционале проÑмотра изображений мобильной верÑии Ñайта
https://hackerone.com/reports/80597 | Number of invited researchers disclosed as part of JSON search response
https://hackerone.com/reports/80936 | Private Program and bounty details disclosed as part of JSON search response
https://hackerone.com/reports/80990 | JetBrains .idea project directory
https://hackerone.com/reports/81083 | Internal bounty and swag details disclosed as part of JSON response
https://hackerone.com/reports/81441 | XSS https://delivery.shopifyapps.com/ (Digital Downloads App in myshopify.com)
https://hackerone.com/reports/81701 | Possible SQL injection on "Jump to twitter"
https://hackerone.com/reports/81736 | XSS in WordPress
https://hackerone.com/reports/81757 | Reflected XSS in chat.
https://hackerone.com/reports/82725 | Stored XSS in comments
https://hackerone.com/reports/84287 | DKIM records not present, Email Hijacking is possible
https://hackerone.com/reports/84601 | XSS and cache poisoning via upload.twitter.com on ton.twitter.com
https://hackerone.com/reports/84709 | [API ISSUE] agents can Create agents even after they are disabled !
https://hackerone.com/reports/84740 | Stored XSS On Statement
https://hackerone.com/reports/85201 | Full Path Disclosure
https://hackerone.com/reports/85291 | XSS https://www.shopify.com/signup
https://hackerone.com/reports/85488 | Stored XSS on player.vimeo.com
https://hackerone.com/reports/85615 | Reflected XSS on vimeo.com/musicstore
https://hackerone.com/reports/85624 | Highly wormable clickjacking in player card
https://hackerone.com/reports/85720 | IDOR on remoing Share
https://hackerone.com/reports/86022 | Multiple so called 'type juggling' attacks. Most notably PhabricatorUser::validateCSRFToken() is 'bypassable' in certain cases.
https://hackerone.com/reports/86468 | [https://www.anghami.com/updatemailinfo/] Sql Injection
https://hackerone.com/reports/86504 | [CRITICAL] Login To Any Account Linked With Google+ With Email Only
https://hackerone.com/reports/87027 | [keybase.io] Open Redirect
https://hackerone.com/reports/87040 | XSS on OAuth authorize/authenticate endpoint
https://hackerone.com/reports/87168 | www.shopify.com XSS on blog pages via sharing buttons
https://hackerone.com/reports/87505 | Full Path Disclosure
https://hackerone.com/reports/87531 | Mail spaming
https://hackerone.com/reports/87577 | Stored XSS on vimeo.com and player.vimeo.com
https://hackerone.com/reports/87586 | ĞебезопаÑĞ½Ğ°Ñ Ñхема выдачи номера карты QVC (возможно, также QVV и QVP)
https://hackerone.com/reports/87588 | XSS Vulnerability
https://hackerone.com/reports/87854 | XSS on vimeo.com/home after other user follows you
https://hackerone.com/reports/88105 | XSS on vimeo.com | "Search within these results" feature (requires user interaction)
https://hackerone.com/reports/88395 | Information leakage through Graphviz blocks
https://hackerone.com/reports/88508 | XSS when using captions/subtitles on video player based on Flash (requires user interaction)
https://hackerone.com/reports/88719 | Multiple DOMXSS on Amplify Web Player
https://hackerone.com/reports/88881 | XSS: https://light.mail.ru/compose, https://m.mail.ru/compose/[id]/reply при ответе на Ñпециальным образом Ñформированное пиÑьмо
https://hackerone.com/reports/89505 | Self-XSS in posts by formatting text as code
https://hackerone.com/reports/89624 | Cross-site Scripting https://www.zendesk.com/product/pricing/
https://hackerone.com/reports/90131 | CSV Excel Macro Injection Vulnerability in export customer tickets
https://hackerone.com/reports/90172 | Tweetdeck (twitter owned app) not revoked
https://hackerone.com/reports/90274 | CSV Excel Macro Injection Vulnerability in export chat logs
https://hackerone.com/reports/90308 | User email enumuration using Gmail
https://hackerone.com/reports/90688 | create staff member without owner access
https://hackerone.com/reports/90690 | change Login Services settings without owner access
https://hackerone.com/reports/90753 | Content Spoofing
https://hackerone.com/reports/91343 | Information disclosure (No rate limting in forgot password & other login)
https://hackerone.com/reports/91421 | Reflected Flash XSS using swfupload.swf with an epileptic reloading to bypass the button-event
https://hackerone.com/reports/91599 | WooCommerce: Support Ticket indirect object reference
https://hackerone.com/reports/91816 | Server Side Request Forgery In Video to GIF Functionality
https://hackerone.com/reports/92251 | Issue with Password reset functionality
https://hackerone.com/reports/92353 | CSV Injection in polldaddy.com
https://hackerone.com/reports/92472 | Tokens from services like Facebook can be stolen
https://hackerone.com/reports/92740 | SPF records not found
https://hackerone.com/reports/93004 | unauthorized access to all collections name
https://hackerone.com/reports/93020 | СпоÑоб узнать Ğ¸Ğ¼Ñ Ñ‡ĞµĞ»Ğ¾Ğ²ĞµĞºĞ° и ВУЗ удаленной Ñтраницы
https://hackerone.com/reports/93394 | Unauthenticated access to details of hidden products in any shop via title emuneration
https://hackerone.com/reports/93691 | Arbitrary write on s3://shopify-delivery-app-storage/files
https://hackerone.com/reports/93901 | Bypassing password requirement during deletion of accout
https://hackerone.com/reports/93921 | Unauthorized access to all collections, products, pages from other stores
https://hackerone.com/reports/94087 | Arbitrary read on s3://shopify-delivery-app-storage/files
https://hackerone.com/reports/94230 | Cross-site Scripting in all Zopim
https://hackerone.com/reports/94584 | Sql-inj in https://maximum.com/ajax/people
https://hackerone.com/reports/94610 | Version Disclosure (NginX)
https://hackerone.com/reports/94637 | Host Header Injection/Redirection
https://hackerone.com/reports/94642 | SMS Invite Form Abuse
https://hackerone.com/reports/94899 | Paid account can review\download any invoice of any other shop
https://hackerone.com/reports/94909 | XSS risk reduction with X-XSS-Protection: 1; mode=block header
https://hackerone.com/reports/95089 | Reflected XSS in cart at hardware.shopify.com
https://hackerone.com/reports/95231 | XSS in the "Poll" Feature on Twitter.com
https://hackerone.com/reports/95243 | Following a User Actually Follows Another User
https://hackerone.com/reports/95552 | IDOR- Activate Mopub on different organizations- steal api token- Fabric.io
https://hackerone.com/reports/95555 | CSRF on cards API
https://hackerone.com/reports/95564 | Persistent XSS in image title
https://hackerone.com/reports/95589 | Privilege escalation and circumvention of permission to limited access user
https://hackerone.com/reports/95981 | Http Response Splitting - Validate link
https://hackerone.com/reports/96229 | XSS on player.vimeo.com without user interaction and vimeo.com with user interaction
https://hackerone.com/reports/96337 | Stored XSS in Slack (weird, trial and error)
https://hackerone.com/reports/96470 | Missing of csrf protection
https://hackerone.com/reports/96636 | Password Reset - query param overrides postdata
https://hackerone.com/reports/96662 | crossdomain.xml too permissive on eu1.badoo.com, us1.badoo.com, etc.
https://hackerone.com/reports/96847 | Un-handled exception leads to Information Disclosure
https://hackerone.com/reports/96855 | Staff members with no permission to access domains can access them.
https://hackerone.com/reports/96890 | A 'Full access' administrator is able to see the shop owners user details
https://hackerone.com/reports/96908 | An administrator without the 'Settings' permission is able to see payment gateways
https://hackerone.com/reports/97161 | Can see private tweets via keyword searches on tweetdeck
https://hackerone.com/reports/97191 | Send AJAX request to external domain
https://hackerone.com/reports/97292 | HTTP header injection in info.hackerone.com allows setting cookies for hackerone.com
https://hackerone.com/reports/97295 | Multiple critical vulnerabilities in Odnoklassniki Android application
https://hackerone.com/reports/97452 | Staff members with no permission can access to the files, uploaded by the administrator
https://hackerone.com/reports/97501 | SVG parser loads external resources on image upload
https://hackerone.com/reports/97510 | Following a User After Favoriting Actually Follows Another User (related to #95243)
https://hackerone.com/reports/97535 | List of devices is accessible regardless of the account limitations
https://hackerone.com/reports/97657 | File upload XSS (Java applet) on http://slackatwork.com/
https://hackerone.com/reports/97672 | File Upload XSS in image uploading of App in mopub
https://hackerone.com/reports/97683 | Reflected Self-XSS in Slack
https://hackerone.com/reports/97938 | XSS m.imgur.com
https://hackerone.com/reports/97948 | Cross-domain AJAX request
https://hackerone.com/reports/98012 | Stored XSS on https://www.algolia.com/realtime-search-demo/*
https://hackerone.com/reports/98247 | login to any user's cashier account and full account information disclosure
https://hackerone.com/reports/98259 | 'Limited' RCE in certain places where Liquid is accepted
https://hackerone.com/reports/98281 | XSS Reflected in test.qiwi.ru
https://hackerone.com/reports/98432 | Urgent : Disclosure of all the apps with hash ID in mopub through API request (Authentication bypass)
https://hackerone.com/reports/98469 | Email Verification Link can be Used as Password Reset Link!
https://hackerone.com/reports/98499 | Apps can access 'channels' beta api
https://hackerone.com/reports/99157 | RC4 cipher suites detected on status.slack.com
https://hackerone.com/reports/99245 | XSS in L.mapbox.shareControl in mapbox.js
https://hackerone.com/reports/99321 | [CSRF] Activate PayPal Express Checkout
https://hackerone.com/reports/99368 | an xss issue
https://hackerone.com/reports/99374 | deleted staff member can add his amazon marketplace web services account to the store.
https://hackerone.com/reports/99424 | Mass Assignment Vulnerability in partners.uber.com
https://hackerone.com/reports/99435 | Open redirect helps to steal Facebook access_token
https://hackerone.com/reports/99594 | Reflected XSS on www.boozt.com
https://hackerone.com/reports/99600 | Urgent : Unauthorised Access to Media content of all Direct messages and protected tweets(Indirect object reference)
https://hackerone.com/reports/99647 | CSRF Add Album On onpatient.com
https://hackerone.com/reports/99708 | Limited CSRF bypass.
https://hackerone.com/reports/99857 | Request Accepts without X-CSRFToken [ Header - Cookie ]
https://hackerone.com/reports/99969 | User with limited access to Index configuration can rename the Index
https://hackerone.com/reports/100509 | Pre-generation of 2FA secret/backup codes seems like an unnecessary risk
https://hackerone.com/reports/100820 | Add tweet to collection CSRF
https://hackerone.com/reports/100849 | URGENT : NICHE.co Account Take Over Vulnerability
https://hackerone.com/reports/100931 | xss in link items (mopub.com)
https://hackerone.com/reports/100938 | An administrator without any permission is able to get order notifications using his APNS Token.
https://hackerone.com/reports/101063 | Drivers can change profile picture
https://hackerone.com/reports/101104 | Subdomain Expired
https://hackerone.com/reports/101145 | Remove anyone's pic gravtar
https://hackerone.com/reports/101324 | RC4 cipher suites detected
https://hackerone.com/reports/101330 | SSL certificate invalid date
https://hackerone.com/reports/101331 | RC4 cipher suites detected
https://hackerone.com/reports/101450 | XSS in creating tweets
https://hackerone.com/reports/101909 | account.ubnt.com CSRF
https://hackerone.com/reports/101962 | Open redirect using theme install
https://hackerone.com/reports/102194 | [CRITICAL] CSRF leading to account take over
https://hackerone.com/reports/102234 | Same-Origin Policy bypass on main domain - ok.ru
https://hackerone.com/reports/102236 | Same-Origin Policy Bypass #2
https://hackerone.com/reports/102327 | content injection
https://hackerone.com/reports/102376 | Ğбход защиты от csrf-ок в m.ok.ru
https://hackerone.com/reports/102755 | Stored XSS in name selection
https://hackerone.com/reports/103351 | [CSRF] Install premium themes
https://hackerone.com/reports/103772 | Open Redirect at *.myshopify.com/account/login?checkout_url=
https://hackerone.com/reports/103787 | CSRF possible when SOP Bypass/UXSS is available
https://hackerone.com/reports/103990 | Null pointer dereference in phar_get_fp_offset()
https://hackerone.com/reports/103991 | mod_lua: Crash in websockets PING handling
https://hackerone.com/reports/103992 | Integer overflow in _Unpickler_Read
https://hackerone.com/reports/103993 | Request Hijacking Vulnerability In RubyGems 2.4.6 And Earlier
https://hackerone.com/reports/103994 | Python 3.3 - 3.5 product_setstate() Out-of-bounds Read
https://hackerone.com/reports/103995 | Use After Free Vulnerability in unserialize() with SplDoublyLinkedList
https://hackerone.com/reports/103996 | Use After Free Vulnerability in unserialize() with SplObjectStorage
https://hackerone.com/reports/103997 | Use After Free Vulnerability in unserialize()
https://hackerone.com/reports/103998 | Use After Free Vulnerability in session deserializer
https://hackerone.com/reports/103999 | Use after free vulnerability in unserialize() with GMP
https://hackerone.com/reports/104000 | Python xmlparse_setattro() Type Confusion
https://hackerone.com/reports/104001 | time_strftime() Buffer Over-read
https://hackerone.com/reports/104002 | Python scan_eol() Buffer Over-read
https://hackerone.com/reports/104003 | Python deque.index() uninitialized memory
https://hackerone.com/reports/104004 | Mem out-of-bounds write (segfault) in ZEND_ASSIGN_DIV_SPEC_CV_UNUSED_HANDLER
https://hackerone.com/reports/104005 | null pointer deref (segfault) in zend_eval_const_expr
https://hackerone.com/reports/104006 | Null pointer deref (segfault) in spl_autoload via ob_start
https://hackerone.com/reports/104007 | Buffer over-read in exif_read_data with TIFF IFD tag
https://hackerone.com/reports/104008 | Uninitialized pointer in phar_make_dirstream
https://hackerone.com/reports/104009 | zend_throw_or_error() format string vulnerability
https://hackerone.com/reports/104010 | SOAP serialize_function_call() type confusion / RCE
https://hackerone.com/reports/104011 | AddressSanitizer reports a global buffer overflow in mkgmtime() function
https://hackerone.com/reports/104012 | Integer overflow in unserialize() (32-bits only)
https://hackerone.com/reports/104013 | heap buffer overflow in enchant_broker_request_dict()
https://hackerone.com/reports/104014 | libcurl duphandle read out of bounds
https://hackerone.com/reports/104015 | curl_setopt_array() type confusion
https://hackerone.com/reports/104016 | Dangling pointer in the unserialization of ArrayObject items
https://hackerone.com/reports/104017 | Arbitrary code execution in str_ireplace function
https://hackerone.com/reports/104018 | Multiple Use After Free Vulnerabilites in unserialize()
https://hackerone.com/reports/104019 | Files extracted from archive may be placed outside of destination directory
https://hackerone.com/reports/104020 | audioop.lin2adpcm Buffer Over-read
https://hackerone.com/reports/104021 | audioop.adpcm2lin Buffer Over-read
https://hackerone.com/reports/104022 | hotshot pack_string Heap Buffer Overflow
https://hackerone.com/reports/104023 | bytearray.find Buffer Over-read
https://hackerone.com/reports/104024 | array.fromstring Use After Free
https://hackerone.com/reports/104025 | use after free in load_newobj_ex
https://hackerone.com/reports/104026 | invalid pointer free() in phar_tar_process_metadata()
https://hackerone.com/reports/104027 | Memory Corruption in phar_parse_tarfile when entry filename starts with null
https://hackerone.com/reports/104028 | Improved fix for bug #69545 (Integer overflow in ftp_genlist() resulting in heap overflow)
https://hackerone.com/reports/104032 | PyFloat_FromString & PyNumber_Long Buffer Over-reads
https://hackerone.com/reports/104033 | tokenizer crash when processing undecodable source code
https://hackerone.com/reports/104087 | Trick make all fixed open redirect links vulnerable again
https://hackerone.com/reports/104359 | shopifyapps.com XSS on sales channels via currency formatting
https://hackerone.com/reports/104465 | git-fastclone allows arbitrary command execution through usage of ext remote URLs in submodules
https://hackerone.com/reports/104543 | HTML injection in apps user review
https://hackerone.com/reports/104559 | XSS on codex.wordpress.org
https://hackerone.com/reports/104917 | Cross-Site Scripting Reflected On Main Domain
https://hackerone.com/reports/104931 | CSRF in Connecting Pinterest Account
https://hackerone.com/reports/105190 | Unsafe usage of Ruby string interpolation enabling command injection in git-fastclone
https://hackerone.com/reports/105419 | Cookie-Based Injection
https://hackerone.com/reports/105463 | risk of having secure=false in a crossdomain.xml
https://hackerone.com/reports/105659 | many xss in widgets.shopifyapps.com
https://hackerone.com/reports/105688 | DOM Based XSS in Checkout
https://hackerone.com/reports/105887 | Know whether private program for company exist or not
https://hackerone.com/reports/105953 | Parameter pollution in social sharing buttons
https://hackerone.com/reports/105977 | DLL Hijacking Vulnerability in GlassWireSetup.exe
https://hackerone.com/reports/105991 | "Remember me" token generated when "Remember me" box unchecked
https://hackerone.com/reports/106084 | Team Member███ associated with a Custom Group Created with 'Program Managment' only permissions can Comments on Bug Reports
https://hackerone.com/reports/106293 | Reflective XSS on wholesale.shopify.com
https://hackerone.com/reports/106305 | Improve signals in reputation
https://hackerone.com/reports/106348 | text injection can be used in phishing 404 page should not include attacker text
https://hackerone.com/reports/106350 | text injection can be used in phishing 404 page should not include attacker text
https://hackerone.com/reports/106384 | Application error message
https://hackerone.com/reports/106427 | HTTP-Response-Splitting on v.shopify.com
https://hackerone.com/reports/106548 | Format string vulnerability in zend_throw_or_error()
https://hackerone.com/reports/106636 | Strored Cross Site Scripting
https://hackerone.com/reports/106779 | Stored XSS in comments
https://hackerone.com/reports/106897 | Stored XSS in /admin/orders
https://hackerone.com/reports/106982 | XSS in imgur mobile
https://hackerone.com/reports/107036 | XSS in imgur mobile 3
https://hackerone.com/reports/107213 | GlassWireSetup.exe subject to EXE planting attack
https://hackerone.com/reports/107296 | Possible Timing Side-Channel in XMLRPC Verification
https://hackerone.com/reports/107336 | Team Member(s) associated with a Group have Read-only permission (Post internal comments) can post comment to all the participants
https://hackerone.com/reports/107358 | reflected in xss
https://hackerone.com/reports/107780 | [cfire.mail.ru] Time Based SQL Injection
https://hackerone.com/reports/107960 | Reflected File Download in community.ubnt.com/restapi/
https://hackerone.com/reports/108082 | Exploiting unauthenticated encryption mode
https://hackerone.com/reports/108113 | Bypassing callback_url validation on Digits
https://hackerone.com/reports/108681 | Use After Free Vulnerability in WDDX Packet Deserialization
https://hackerone.com/reports/108682 | Type Confusion Vulnerability in PHP_to_XMLRPC_worker()
https://hackerone.com/reports/108683 | Session WDDX Packet Deserialization Type Confusion Vulnerability
https://hackerone.com/reports/109054 | HTTP trace method is enabled
https://hackerone.com/reports/109161 | protect against tabnabbing in statement
https://hackerone.com/reports/109175 | Use After Free in sortWithSortKeys()
https://hackerone.com/reports/109212 | [parapa.mail.ru] SQL Injection
https://hackerone.com/reports/109483 | User with Read-Only permissions can request/approve public disclosure
https://hackerone.com/reports/109699 | Subdomain Takeover in http://assets.goubiquiti.com/
https://hackerone.com/reports/109815 | Direct URL access to completed reports
https://hackerone.com/reports/109843 | Uninitialized pointer in phar_make_dirstream()
https://hackerone.com/reports/109959 | Extended policy checks are buggy
https://hackerone.com/reports/110293 | Insufficient OAuth callback validation which leads to Periscope account takeover
https://hackerone.com/reports/110352 | Perl 5.22 VDir::MapPathA/W Out-of-bounds Reads and Buffer Over-reads
https://hackerone.com/reports/110417 | Heap corruption in tar/zip/phar parser
https://hackerone.com/reports/110467 | Bypassing Digits bridge origin validation
https://hackerone.com/reports/110578 | HTML injection can lead to data theft
https://hackerone.com/reports/110655 | Information Exposure Through Directory Listing
https://hackerone.com/reports/110720 | Arbitary Memory Read via gdImageRotateInterpolated Array Index Out of Bounds
https://hackerone.com/reports/110722 | Heap BufferOver Flow in escapeshellargs and escapeshellcmd functions
https://hackerone.com/reports/110801 | Internal GET SSRF via CSRF with Press This scan feature
https://hackerone.com/reports/111078 | Sub Domain Take over
https://hackerone.com/reports/111094 | Content Spoofing OR Text Injection in https://withinsecurity.com
https://hackerone.com/reports/111192 | CSV Injection via the CSV export feature
https://hackerone.com/reports/111216 | Twitter Disconnect CSRF
https://hackerone.com/reports/111218 | Attach Pinterest account - no State/CSRF parameter in Oauth Call back
https://hackerone.com/reports/111365 | XSS at www.woothemes.com
https://hackerone.com/reports/111386 | Legacy API exposes private video titles
https://hackerone.com/reports/111417 | Checking whether user liked the media or not even when you are blocked
https://hackerone.com/reports/111500 | XSS at wordpress.com
https://hackerone.com/reports/111752 | Big Bug in SSL : breach compression attack (CVE-2013-3587) affect imgur.com
https://hackerone.com/reports/111860 | Error Page Text Injection #106350
https://hackerone.com/reports/111915 | [CRITICAL] HTML injection issue leading to account take over
https://hackerone.com/reports/111950 | [allods.my.com] SSRF / XSPA
https://hackerone.com/reports/111968 | Interstitial redirect bypass / open redirect in https://hackerone.com/zendesk_session
https://hackerone.com/reports/112057 | Heapoverflow in zipimporter module
https://hackerone.com/reports/112386 | smartlist_add, smartlist_insert (may) cause heap corruption as a result of inadequate checks in smartlist_ensure_capacity
https://hackerone.com/reports/112496 | Session Issue Maybe Can lead to huge loss [CRITICAL]
https://hackerone.com/reports/112555 | [afisha.mail.ru] SQL Injection
https://hackerone.com/reports/112632 | [tor] libevent dns remote stack overread vulnerability
https://hackerone.com/reports/112723 | PHP-FPM fpm_log.c memory leak and buffer overflow
https://hackerone.com/reports/112784 | libevent (stack) buffer overflow in evutil_parse_sockaddr_port
https://hackerone.com/reports/112855 | EIP control using type confusion in json encoding
https://hackerone.com/reports/112858 | UAF in xmlparser_setevents (1)
https://hackerone.com/reports/112860 | UAF in xmlparser_setevents (2)
https://hackerone.com/reports/112863 | Trivial age-old heap overflow in 32-bit PHP
https://hackerone.com/reports/112935 | Unintended HTML inclusion as a result of https://hackerone.com/reports/110578
https://hackerone.com/reports/112955 | WordPress Failure Notice page will generate arbitrary hyperlinks
https://hackerone.com/reports/113070 | Multiple issues with Markdown and URL parsing
https://hackerone.com/reports/113112 | Open-redirect on paragonie.com
https://hackerone.com/reports/113120 | An integer overflow bug in php_implode() could lead heap overflow, make PHP to crash
https://hackerone.com/reports/113122 | An integer overflow bug in php_str_to_str_ex() led arbitrary code execution.
https://hackerone.com/reports/113268 | Integer overflow in wordwrap
https://hackerone.com/reports/113288 | OpenSSL Key Recovery Attack on DH small subgroups (CVE-2016-0701)
https://hackerone.com/reports/113424 | [tor] control connection pre-auth DoS (infinite loop) with --enable-bufferevents
https://hackerone.com/reports/113798 | Null pointer deref with ob_start with compact
https://hackerone.com/reports/113799 | Null pointer deref with ob_start with get_defined_vars
https://hackerone.com/reports/114024 | Stack overflow when decompressing tar archives
https://hackerone.com/reports/114078 | Use-after-free vulnerability in SPL(ArrayObject, unserialize)
https://hackerone.com/reports/114079 | Use-after-free vulnerability in SPL(SplObjectStorage, unserialize)
https://hackerone.com/reports/114125 | Remote Server Restart Lead to Denial of Server by only one Request.
https://hackerone.com/reports/114169 | Bypassing Digits web authentication's host validation with HPP
https://hackerone.com/reports/114172 | Out-of-Bound Read in phar_parse_zipfile()
https://hackerone.com/reports/114339 | Type Confusion in WDDX Packet Deserialization
https://hackerone.com/reports/114414 | openssl_seal() uninitialized memory usage
https://hackerone.com/reports/114430 | CSRF on https://shopify.com/plus
https://hackerone.com/reports/114476 | Внедрение внешних ÑущноÑтей в функционале импорта пользователей YouTrack
https://hackerone.com/reports/114529 | Content Spoofing and Local Redirect in Mapbox Studio
https://hackerone.com/reports/114698 | Remote Server Restart Lead to Denial of Service by only one Request.
https://hackerone.com/reports/115007 | Race conditions can be used to bypass invitation limit
https://hackerone.com/reports/115205 | Putting link inside link in markdown
https://hackerone.com/reports/115230 | Content spoofing due to the improper behavior of the not-found meesage
https://hackerone.com/reports/115275 | SPF DNS Record
https://hackerone.com/reports/115284 | prevent content spoofing on /search
https://hackerone.com/reports/115291 | [orsotenslimselfie.lady.mail.ru] SQL Injection
https://hackerone.com/reports/115337 | Full Path Disclosure
https://hackerone.com/reports/115686 | [tor] pre-emptive defenses, potential vulnerabilities
https://hackerone.com/reports/115702 | [tor] libevent dns OOB read
https://hackerone.com/reports/115748 | SSRF in https://imgur.com/vidgif/url
https://hackerone.com/reports/115857 | SSRF and local file read in video to gif converter
https://hackerone.com/reports/115978 | SSRF / Local file enumeration / DoS due to improper handling of certain file formats by ffmpeg
https://hackerone.com/reports/116006 | XSS on hardware.shopify.com
https://hackerone.com/reports/116029 | Private program activity timeline information disclosure
https://hackerone.com/reports/116032 | Private Program Disclosure in /:handle/reports/draft.json endpoint
https://hackerone.com/reports/116286 | Type confusion in partial.setstate, partial_repr, partial_call leads to memory corruption, reliable control flow hijack
https://hackerone.com/reports/116360 | The POODLE attack (SSLv3 supported) for https://grtp.co/
https://hackerone.com/reports/116372 | Use-After-Free / Double-Free in WDDX Deserialize
https://hackerone.com/reports/116419 | an xss issue in https://hunter22.slack.com/help/requests/793043
https://hackerone.com/reports/116508 | [3k.mail.ru] SQL Injection
https://hackerone.com/reports/116570 | VERY DANGEROUS XSS STORED inside emails
https://hackerone.com/reports/116764 | vk.com/login.php
https://hackerone.com/reports/116773 | Type Confusion Vulnerability - SOAP / make_http_soap_request()
https://hackerone.com/reports/116798 | Private Program Disclosure in /:handle/settings/allow_report_submission.json endpoint
https://hackerone.com/reports/116937 | Chat History CSV Export Excel Injection Vulnerability
https://hackerone.com/reports/116951 | Increase number of bugs by sending duplicate of your own valid report
https://hackerone.com/reports/116973 | No Valid SPF Records.
https://hackerone.com/reports/117068 | XSS @ love.uber.com
https://hackerone.com/reports/117080 | Multiple Vulnerabilities (Including SQLi) in love.uber.com
https://hackerone.com/reports/117097 | Email Forgery through Mandrillapp SPF
https://hackerone.com/reports/117142 | limit HTTP methods on other domains
https://hackerone.com/reports/117149 | SPF/DKIM/DMARC for grtp.co
https://hackerone.com/reports/117159 | SPF/DKIM/DMARC for aspen.io
https://hackerone.com/reports/117187 | Prevent content spoofing on /~username/emails/verify.html
https://hackerone.com/reports/117190 | Reflected XSS on Uber.com careers
https://hackerone.com/reports/117325 | DMARC is misconfigured for grtp.co
https://hackerone.com/reports/117330 | stop serving grtp.co over HTTP
https://hackerone.com/reports/117449 | XSS in Draft Orders in Timeline i SHOPIFY Admin Site!
https://hackerone.com/reports/117458 | strengthen Diffie-Hellman (DH) key exchange parameters in grtp.co
https://hackerone.com/reports/117480 | Stored XSS via Angular Expression injection on developer.zendesk.com
https://hackerone.com/reports/117651 | Multiple Heap Overflow due to integer overflows | xml/filter_url/addcslashes
https://hackerone.com/reports/117739 | limit number of images in statement
https://hackerone.com/reports/117902 | Дорк
https://hackerone.com/reports/118066 | Content Spoofing in mango.qiwi.com
https://hackerone.com/reports/118582 | CSV Injection at the CSV export feature
https://hackerone.com/reports/118631 | XSSI (Cross Site Script Inclusion)
https://hackerone.com/reports/118688 | File name and folder enumeration.
https://hackerone.com/reports/118718 | User with Read-Only permissions can manually public disclosure the report
https://hackerone.com/reports/118855 | CVE-2016-0799 memory issues in BIO_*printf functions
https://hackerone.com/reports/118925 | API Key added for one Indices works for all other indices too.
https://hackerone.com/reports/118965 | Distinguish EP+Private vs Private programs in HackerOne
https://hackerone.com/reports/119022 | Tweet Deck XSS- Persistent- Group DM name
https://hackerone.com/reports/119166 | Able to view others' gifts on /gift/share URL, giftId is predictable, and easy to manipulate
https://hackerone.com/reports/119220 | Sub-Domain Takeover
https://hackerone.com/reports/119221 | User with Read-Only permissions can edit the Internal comment Activities on Bug Reports After Revoke the team access permissions
https://hackerone.com/reports/119236 | Open Redirection on Uber.com
https://hackerone.com/reports/119250 | xss in the all widgets of shopifyapps.com
https://hackerone.com/reports/119317 | Read-Only user can execute arbitraty shell commands on AirOS
https://hackerone.com/reports/119471 | DOMXSS in Tweetdeck
https://hackerone.com/reports/119652 | Adobe Flash Player ASnative(101,10) Memory Corruption Vulnerability
https://hackerone.com/reports/119653 | Adobe Flash Player ASnative(900,1).call(MovieClip) Use-After-Free Vulnerability
https://hackerone.com/reports/119655 | Adobe Flash Player ASnative(900,1).call(TextField) Use-After-Free Vulnerability
https://hackerone.com/reports/119657 | Adobe Flash Player Race Condition Vulnerability
https://hackerone.com/reports/119873 | BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797)
https://hackerone.com/reports/120026 | don't serve hidden files from Nginx
https://hackerone.com/reports/121461 | Subdomain takeover due to unclaimed Amazon S3 bucket on a2.bime.io
https://hackerone.com/reports/121469 | Broken Authentication on Badoo
https://hackerone.com/reports/121489 | CRLF injection in https://verkkopalvelu.lahitapiola.fi/
https://hackerone.com/reports/121696 | Bypass two-factor authentication
https://hackerone.com/reports/121827 | Account Takeover
https://hackerone.com/reports/121863 | Buffer overflow in HTTP url parsing functions
https://hackerone.com/reports/121940 | Shell Injection via Web Management Console (dl-fw.cgi)
https://hackerone.com/reports/122050 | Mapbox API Access Token with No Scope Can Read Styles
https://hackerone.com/reports/122113 | OpenSSH / dropbearSSHd xauth command injection
https://hackerone.com/reports/122254 | Adobe Flash Player TextField Use-After-Free Vulnerability
https://hackerone.com/reports/122256 | Adobe Flash Player Uninitialised Memory Corruption
https://hackerone.com/reports/122849 | Stored XSS in https://checkout.shopify.com/
https://hackerone.com/reports/123027 | Edit Auto Response Messages
https://hackerone.com/reports/123119 | Use after free with assign by ref to overloaded objects
https://hackerone.com/reports/123125 | XSS on hardware.shopify.com
https://hackerone.com/reports/123339 | CSRF allows attacker to delete item from customer's "Postilaatikko"
https://hackerone.com/reports/123615 | SECURITY: Referencing previous Reports attachment_IDs on new Reports via Draft_Sync DELETES Attachments
https://hackerone.com/reports/123742 | suppress version in Server header on gratipay.com or grtp.co
https://hackerone.com/reports/123849 | Cookie Does Not Contain The "secure" Attribute
https://hackerone.com/reports/123897 | auto-logout after 20 minutes
https://hackerone.com/reports/124100 | Shopify GitHub Login and Password exposed all private source code might be available.
https://hackerone.com/reports/124223 | CSV Injection via the CSV export feature
https://hackerone.com/reports/124277 | XSS via React element spoofing
https://hackerone.com/reports/124429 | Stored XSS via "Free Shipping" option (Discounts)
https://hackerone.com/reports/124611 | Disclosure of private programs that have an "external" page on HackerOne
https://hackerone.com/reports/124737 | Multiple Heap Overflows in php_raw_url_encode/php_url_encode
https://hackerone.com/reports/124845 | Bypassed password authentication before enabling OTP verification
https://hackerone.com/reports/124889 | Websites opened from reports can change url of report page
https://hackerone.com/reports/124976 | Hijacking user session by forcing the use of invalid HTTPs Certificate on images.gratipay.com
https://hackerone.com/reports/125000 | Open Redirect in m.uber.com
https://hackerone.com/reports/125027 | Reflected XSS on developer.uber.com via Angular template injection
https://hackerone.com/reports/125112 | XSS in getrush.uber.com
https://hackerone.com/reports/125200 | Lack of rate limiting on get.uber.com leads to enumeration of promotion codes and estimation of a lower bound on the number of Uber drivers
https://hackerone.com/reports/125250 | Avoiding Surge Pricing
https://hackerone.com/reports/125498 | Dom Based Xss
https://hackerone.com/reports/125505 | Possibility to brute force invite codes in riders.uber.com
https://hackerone.com/reports/125587 | Hogging up all the resources on hackerone.com
https://hackerone.com/reports/125791 | Reflected XSS via Unvalidated / Open Redirect in uber.com
https://hackerone.com/reports/125849 | XSS found on Snapchat website
https://hackerone.com/reports/125980 | uber.com may RCE by Flask Jinja2 Template Injection
https://hackerone.com/reports/126010 | prevent content spoofing on /~username/emails/verify.html
https://hackerone.com/reports/126099 | Stored XSS in drive.uber.com WordPress admin panel
https://hackerone.com/reports/126109 | CSV Injection in business.uber.com
https://hackerone.com/reports/126197 | XSS In archive.uber.com Due to Mime Sniffing in IE
https://hackerone.com/reports/126203 | CBC "cut and paste" attack may cause Open Redirect(even XSS)
https://hackerone.com/reports/126209 | Posting modified information in 'Investment section' will cause unintended information change in verkkopalvelu.tapiola.fi
https://hackerone.com/reports/126416 | Integer Overflow in php_raw_url_encode
https://hackerone.com/reports/126522 | Incorrect param parsing in Digits web authentication
https://hackerone.com/reports/126539 | XSS on https://app.shopify.com/
https://hackerone.com/reports/126652 | potential remote code execution with phar archive
https://hackerone.com/reports/126797 | Use-after-free during XML transformations (MFSA-2016-27)
https://hackerone.com/reports/126906 | Stored XSS in archive.uber.com Due to Injection of Javascript:alert(0)
https://hackerone.com/reports/127077 | www.lahitapiola.fi DOM XSS by choosing regional company
https://hackerone.com/reports/127154 | XSS using javascript:alert(8007)
https://hackerone.com/reports/127212 | php_snmp_error() Format String Vulnerability
https://hackerone.com/reports/127242 | Negative size parameter (-1) in memcpy mbfl_strcut
https://hackerone.com/reports/127620 | New hacktivity view discloses report IDs of non-public reports
https://hackerone.com/reports/127703 | [CRITICAL] Full account takeover using CSRF
https://hackerone.com/reports/127844 | Web Authentication Endpoint Credentials Brute-Force Vulnerability
https://hackerone.com/reports/127918 | Easy spam with USE My PHONE Feature
https://hackerone.com/reports/127948 | Stored XSS on newsroom.uber.com admin panel / Stream WordPress plugin
https://hackerone.com/reports/127995 | Limit email address length
https://hackerone.com/reports/128088 | AWS S3 bucket writeable for authenticated aws users
https://hackerone.com/reports/128114 | Administrator access to a Django Administration Panel on *.sc-corp.net via bruteforced credentials
https://hackerone.com/reports/128121 | fix bug in username restriction
https://hackerone.com/reports/128169 | BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
https://hackerone.com/reports/128750 | Read-Only user can execute arbitraty shell commands on AirOS
https://hackerone.com/reports/128777 | No rate-limit in Two factor Authentication leads to bypass using bruteforce attack
https://hackerone.com/reports/128856 | Send email asynchronously
https://hackerone.com/reports/129001 | Cookie-based client-side denial-of-service to all of the Lähitapiola domains
https://hackerone.com/reports/129091 | CPU utilization 99% on visiting wordpress site url & open redirect found
https://hackerone.com/reports/129381 | niche s3 buckets are readable/writeable/deleteable by authorized AWS users
https://hackerone.com/reports/129436 | xss in DM group name in twitter
https://hackerone.com/reports/129771 | Python 2.7 strop.replace Integer Overflow
https://hackerone.com/reports/129773 | Previous attachments can be referenced when creating a new report
https://hackerone.com/reports/129862 | Stored XSS on [your_zendesk].zendesk.com in Facebook Channel
https://hackerone.com/reports/129873 | Bypassing Digits origin validation which leads to account takeover
https://hackerone.com/reports/130889 | Reflected XSS in scores.ubnt.com
https://hackerone.com/reports/131065 | bring grtp.co up to A grade on SSLLabs
https://hackerone.com/reports/131082 | Open Redirector via (apps/files_pdfviewer) for un-authenticated users.
https://hackerone.com/reports/131108 | Akismet Several CSRF vulnerabilities
https://hackerone.com/reports/131202 | [Critical] - Steal OAuth Tokens
https://hackerone.com/reports/131450 | Stored XSS in developer.uber.com
https://hackerone.com/reports/132104 | Stored XSS on team.slack.com using new Markdown editor of posts inside the Editing mode and using javascript-URIs
https://hackerone.com/reports/132602 | Stored XSS at Udemy
https://hackerone.com/reports/133963 | XSS on www.wordpress.com
https://hackerone.com/reports/134061 | Reflected XSS via Livefyre Media Wall in newsroom.uber.com
https://hackerone.com/reports/134321 | RCE on facebooksearch.algolia.com
https://hackerone.com/reports/134388 | Content Spoofing or Text Injection (404 error page injection on yrityspalvelu)
https://hackerone.com/reports/134434 | XSS In /zuora/ functionality
https://hackerone.com/reports/134546 | WordPress Flash XSS in *flashmediaelement.swf*
https://hackerone.com/reports/134738 | WordPress SOME bug in plupload.flash.swf leading to RCE
https://hackerone.com/reports/134757 | staff memeber can install apps even if have limitied access
https://hackerone.com/reports/134880 | ASN.1 BIO excessive memory allocation (CVE-2016-2109)
https://hackerone.com/reports/135072 | RCE in profile picture upload
https://hackerone.com/reports/135152 | Integer overflow in ZipArchive::getFrom*
https://hackerone.com/reports/135217 | Reflected cross-site scripting (XSS) on api.tiles.mapbox.com
https://hackerone.com/reports/135288 | Multiple vulnerabilities in a WordPress plugin at drive.uber.com
https://hackerone.com/reports/135291 | Out-of-bounds reads in zif_grapheme_stripos with negative offset
https://hackerone.com/reports/135293 | bcpowmod accepts negative scale and corrupts _one_ definition
https://hackerone.com/reports/135294 | xml_parse_into_struct segmentation fault
https://hackerone.com/reports/135756 | View all deleted comments and rating of any app .
https://hackerone.com/reports/135797 | Session Fixation
https://hackerone.com/reports/135944 | EVP_EncodeUpdate overflow (CVE-2016-2105)
https://hackerone.com/reports/135945 | EVP_EncryptUpdate overflow (CVE-2016-2106)
https://hackerone.com/reports/135946 | EBCDIC overread (CVE-2016-2176)
https://hackerone.com/reports/136169 | OneLogin authentication bypass on WordPress sites
https://hackerone.com/reports/136221 | Denial of service in account statistics endpoint
https://hackerone.com/reports/136454 | User credentials leak and arbitrary local file read/leak due to same-origin-policy violation
https://hackerone.com/reports/136481 | CSRF on Vimeo via cross site flashing leading to info disclosure and private videos go public
https://hackerone.com/reports/136582 | OAuth 2 Authorization Bypass via CSRF and Cross Site Flashing
https://hackerone.com/reports/136600 | Reflected XSS in Backend search
https://hackerone.com/reports/136720 | don't leak server version of grtp.co in error pages
https://hackerone.com/reports/136850 | Images and Subtitles Leakage from private videos
https://hackerone.com/reports/136986 | Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)
https://hackerone.com/reports/137487 | Amazon Bucket Accessible (http://inpref.s3.amazonaws.com/)
https://hackerone.com/reports/137502 | All Vimeo Private videos disclosure via Authorization Bypass
https://hackerone.com/reports/137956 | SQL Injection
https://hackerone.com/reports/138025 | Heap corruption via memarea.c
https://hackerone.com/reports/138075 | [stored xss, pornhub.com] stream post function
https://hackerone.com/reports/138179 | Divide-and-conquer session key recovery in SSLv2 (CVE-2016-0703)
https://hackerone.com/reports/138181 | Bleichenbacher oracle in SSLv2 (CVE-2016-0704)
https://hackerone.com/reports/138243 | [IDOR] Deleting other users comment
https://hackerone.com/reports/138244 | Missing access control exposing detailed information on all users
https://hackerone.com/reports/138516 | Adobe Flash Player ContentFactory class Memory Corruption Vulnerability
https://hackerone.com/reports/138517 | Adobe Flash Player Metadata class Memory Corruption Vulnerability
https://hackerone.com/reports/138518 | Adobe Flash Player OpportunityGenerator class Memory Corruption Vulnerability
https://hackerone.com/reports/138869 | OneLogin authentication bypass on WordPress sites via XMLRPC
https://hackerone.com/reports/139004 | Persistent XSS at verkkopalvelu.tapiola.fi using spoofed React element and React v.0.13.3
https://hackerone.com/reports/139192 | Ability to collect users' ids that have visited a specific web page with malicious code
https://hackerone.com/reports/139245 | WordPress core stored XSS via attachment file name
https://hackerone.com/reports/139398 | Read-Only user can execute arbitraty shell commands on AirOS
https://hackerone.com/reports/139626 | Passphrase credential lock bypass
https://hackerone.com/reports/139879 | Adobe Flash Player Regular Expression UAF Remote Code Execution Vulnerability
https://hackerone.com/reports/140432 | configure a redirect URI for Facebook OAuth
https://hackerone.com/reports/140447 | Open Redirect on slack.com
https://hackerone.com/reports/140548 | [upload-X.my.mail.ru] /uploadphoto Insecure Direct Object References
https://hackerone.com/reports/140616 | www.starbucks.co.uk Reflected XSS via utm_source parameter