Best Quality
0 5/10

A researcher discovered a SQL injection vulnerability in a trading company's web application through a hidden 'status' parameter in the report download endpoint, which was found using parameter mining techniques and exploited using time-based blind SQL injection.

Rutvik Hajare sqlmap Burp Suite OWASP
hajarerutik9.medium.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 5/10

A bug bounty finding demonstrating a 2FA bypass via forced browsing by directly accessing an unprotected signup endpoint (/_ajax/signup instead of /_api/signup/verify), allowing account creation without OTP verification by modifying the API request to include password field.

Akhil Burp Suite HackerOne Bugcrowd
infosecwriteups.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 5/10

Researcher bypassed 2FA on www.domain.com by intercepting the login request with Burp Suite, changing the Host header to beta.domain.com (a parallel subdomain without 2FA enforcement), and submitting an arbitrary code (000000) to successfully authenticate. The vulnerability stemmed from inconsistent 2FA implementation across subdomains, fixed within one day but without bounty payout.

Seqrity InfoSec Write-ups
infosecwriteups.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 5/10

Researcher discovered a deserialization vulnerability in a JSF-based web application by identifying unencrypted serialized Java objects in the javax.faces.ViewState parameter, leading to remote code execution via JMX console exploitation and a $1500 bounty reward.

Ashish Kunwar Jexboss BugCrowd Prototype 1.6.1 JBoss JSF MyFaces
medium.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 5/10

Researcher discovered a full account takeover vulnerability by chaining multiple weaknesses: a password change endpoint that accepted null CSRF tokens and lacked proper validation, combined with a hidden 'uid' parameter discoverable via Param Miner that allowed changing arbitrary users' passwords without authentication. The vulnerability earned a $1000 bounty.

Mohsin Khan Param Miner James Kettle PortSwigger Burp Suite
mokhansec.medium.com · kh4sh3i/bug-bounty-writeups · 15 hours ago · details
0 5/10
vulnerability

A griefing vulnerability in Lido's Dual Governance RageQuit mechanism allowed permissionless prolongation of the RageQuit extension period, potentially blocking ETH withdrawals and protocol governance. The issue required >10% stETH veto participation to trigger and was mitigated by Emergency Committee safeguards; a patched smart contract fix was successfully deployed in September 2025.

Lido Immunefi Dual Governance RageQuit Escrow.startRageQuitExtensionPeriod() Emergency Committee Tiebreaker committee Vote #191 Proposal #4 stETH LDO
research.lido.fi · riptide · 15 hours ago · details
0 5/10
vulnerability

A critical DoS vulnerability in Stacks' Clarity virtual machine was discovered where an unhandled exception in the smart contract interpreter caused client nodes to crash when processing malicious contracts. The vulnerability was patched by modifying error handling to return proper exceptions instead of using `.expect()` calls.

Stacks Immunefi Catchme Clarity Bitcoin PoX (Proof of Transfer)
medium.com · Catchme · 15 hours ago · details
0 5/10
bug-bounty

A researcher discovered a critical $150,000 Evmos vulnerability by simply reading Cosmos documentation—sending funds to the distribution module account (which should be blocklisted) triggered invariant violations that halted the entire blockchain and all dependent dApps.

Evmos Cosmos Immunefi jayjonah.eth x/bank module distribution module
medium.com · jayjonah.eth · 15 hours ago · details
0 5/10
vulnerability

Vesu disclosed a critical rounding convention vulnerability in the Singleton contract's liquidate_position function that could allow fund theft through malicious pool extensions, flashloans, and receive_as_shares flag manipulation. The vulnerability was remediated by removing the affected liquidation logic, whitelisting pool extensions, and migrating all user funds.

Vesu Immunefi Argent Labs ChainSecurity Re7 Labs Braavos Alterscope
docs.vesu.xyz · Alex · 15 hours ago · details
0 5/10
vulnerability

ANKR's distributeRewards() function uses low-level call with insufficient gas specification, inadvertently passing 12,300 gas instead of 10,000 due to BSC's free stipend mechanism, increasing gas costs and reentrancy attack surface area.

ANKR BSC 0x66BEA595AEFD5a65799a920974b377Ed20071118
trust-security.xyz · Trust · 15 hours ago · details
0 5/10
bug-bounty

Brahma vault's collectFees() function incorrectly charges performance fees on gains without accounting for losses, causing users to lose portions of their original deposits during volatile market conditions. The bug stems from not tracking maximum share price per user or accumulated losses, allowing fees to be extracted from principal rather than only from actual profits.

Brahma 0x3c4Fe0db16c9b521480c43856ba3196A9fa50E08 Immunefi Enso Finance code-423n4
trust-security.xyz · Trust · 15 hours ago · details
0 5/10
vulnerability

A critical vulnerability in the Betverse ICO Token contract's transferTokenToLockedAddresses() function was caused by incorrect public visibility, allowing anyone to steal BToken by transferring amounts to arbitrary time lock addresses. The article also covers related access control vulnerabilities in Ocean Protocol and Oasys smart contracts.

Betverse Immunefi Ocean Protocol Oasys Shanmuga Bharathi
mirror.xyz · Shanmuga Bharathi. N · 15 hours ago · details
0 5/10
bug-bounty

Technical writeup of smart contract vulnerabilities found in Ocean Protocol's Hybrid NFT implementation, where on-chain data can be manipulated to exploit contract logic, along with references to other blockchain security issues in Oasys and Eco ecosystems.

Ocean Protocol Oasys Eco Immunefi Merkle Bonsai Bandai Namco DoubleJump.japan
mirror.xyz · merkle_bonsai · 15 hours ago · details
0 5/10
vulnerability

An arbitrary method call vulnerability in xDai's Arbitrary Message Bridge (AMB) contracts allowed attackers to execute unauthorized token transfers on behalf of the bridge contracts, exploiting the fact that AMB contracts could inadvertently receive user funds despite not being intended to hold them. The vulnerability was patched by introducing monitoring on Transfer events to identify and protect locked tokens.

xDai Immunefi 0xadee028d Arbitrary Message Bridge (AMB) OmniBridge renBTC Ethereum Mainnet
medium.com · unknown · 15 hours ago · details
0 5/10
vulnerability

A critical logic error in Port Finance's lending protocol allowed attackers to manipulate LTV calculations and liquidation mechanics, potentially stealing $20–25 million. The vulnerability was responsibly disclosed by whitehat nojob via Immunefi, resulting in a $180,000 + $450,000 PORT token bounty and a swift patch by Port Finance.

Port Finance Immunefi nojob Halborn Piotr Solana
medium.com · nojob · 15 hours ago · details
0 5/10
bug-bounty

Alchemix had an access control vulnerability in the setWhitelist() function of AlchemistEth.sol that allowed any user to designate arbitrary addresses as keepers, enabling DoS attacks on harvest() and flush() functions. The vulnerability was patched by adding an onlyGov modifier and renaming the function to setKeepers().

Alchemix Ashiq Amien iosiro Immunefi yearn.finance AlchemistEth.sol CVE-2021-41119
medium.com · Ashiq Amien · 15 hours ago · details
0 5/10

A Facebook bug allowed page admins to unintentionally disclose their admin status by upgrading a page post to a life event, which would then appear on their personal profile and reveal their connection to the page when other users visited it. The vulnerability was fixed within 2 months of disclosure and the researcher received a bounty.

Facebook Dan Fabro
medium.com · dw1 · 15 hours ago · details
0 5/10

A bug bounty writeup demonstrating SSRF exploitation on a job posting URL field by enumerating open/closed ports on localhost (127.0.0.1) using HTTP/HTTPS requests and observing different HTTP response codes (201 vs 400) to detect port status, leading to internal network reconnaissance.

Deepak Holani Burp Collaborator HackerOne
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

A security researcher describes discovering 3 vulnerabilities in Yahoo's bug bounty program: two remote code executions via command injection in a Brightroll queue management service (with filter bypass techniques), and an SSRF leading to arbitrary file read via curl flag injection in the Yahoo Small Business image processing endpoint.

Kedrisec Yahoo Brightroll RabbitMQ Aquatone Google AWS
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

A brute-force vulnerability in Oculus's identity verification system allowed bypassing username-change OTP validation by exploiting missing rate limiting on 6-digit verification codes. The attacker tested 1,971 payloads and identified the correct OTP by detecting response length differences (valid: 840 bytes vs invalid: 1152 bytes).

Oculus Meta Karthik Kumar Reddy Burp Suite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

Educational overview of buffer overflow vulnerabilities, explaining how stack-based buffer overflows work, providing vulnerable C code examples, and describing exploitation via return address overwriting with shellcode. Also covers common OS-level mitigations like ASLR, NX bit, and StackGuard.

Piotr Sobolewski Invicti StackGuard Linux Microsoft Windows macOS
netsparker.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

A CORS misconfiguration on Twitter's Niche platform allowed attackers to bypass origin validation by registering subdomains like 'niche.co.evil.net', enabling theft of private synced posts and user data from Twitter, Facebook, and Instagram through a vulnerable API endpoint.

Twitter Facebook Instagram Niche (Twitter product) Rohan Aggarwal HackerOne Medium DefCore Security
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

A researcher discovered an SSRF/XSPA vulnerability in Microsoft's Bing Webmaster Central that could be bypassed using the nip.io DNS service to resolve to internal IP addresses (127.127.127.127) and enumerate local ports and administrative directories.

Microsoft Bing Bing Webmaster Central Elber Andre nip.io
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

A pentester discovered a CORS misconfiguration on a mobile app API that accepts arbitrary origins with credentials enabled, allowing potential theft of sensitive account information. The vulnerability required manual exploitation via a proof-of-concept HTML page with injected cookies due to the API's mobile-only scope, resulting in a framework-level issue acknowledgment from the developer.

Smaran Chand Bugcrowd Frida Burpsuite Firefox
smaranchand.com.np · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

A security researcher discovered a critical P1 RCE vulnerability in a Jenkins instance by finding it via Shodan, exploiting open registration and the built-in script console to execute arbitrary commands on the server. The misconfiguration resulted from the developer relying on security through obscurity by running Jenkins on a non-standard port.

Shodan Jenkins sw33tLie
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

A researcher discovered an SSRF vulnerability in a crypto exchange platform's image loading endpoint that allowed reading local files via file:// protocol and extracting AWS EC2 metadata credentials from the 169.254.169.254 metadata service, ultimately achieving RCE and receiving a 4-digit bounty.

pratik yadav AWS EC2 Elastic Beanstalk brutelogic.com.br ENCIPHERS Abhinav mishra Narendra abhishek NotSoSecure
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

Researcher discovered an RCE vulnerability on ASUS's RMA portal by bypassing front-end file upload restrictions, uploading an ASP shell to the predictable /uploads directory on IIS 8.5. The vulnerability was patched after disclosure, though the researcher experienced poor communication from ASUS and had to persist to be added to their Hall of Fame.

ASUS rma.asus-europe.eu Mustafa Kemal Can Microsoft-IIS 8.5 [email protected]
mustafakemalcan.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

A researcher discovered an OTP brute-force vulnerability in a login mechanism where missing rate limiting allowed attackers to brute-force 6-digit OTPs by exploiting different response codes for valid/invalid attempts, leading to account takeover. The vulnerability was reported and fixed within a day, earning the researcher a 4-digit bounty payout.

Th3Y0ungM0nk BurpSuite Intruder EditThisCookie
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10
vulnerability

A CORS bypass technique exploiting improper Origin header validation by injecting the target domain as a subdomain of the attacker's domain (e.g., redact.com.attacker.com), allowing credential-enabled requests to leak sensitive account information from the victim site.

Saad Ahmed
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
0 5/10

Researcher exploited CVE-2017-5638 (Apache Struts2 RCE) in a Yahoo application by discovering a vulnerable .do endpoint and bypassing the WAF using a specially crafted Content-Type header payload, earning a $5,500 bounty from Yahoo through HackerOne.

CVE-2017-5638 Apache Struts2 Yahoo Selligent Messages Studio HackerOne Th3G3nt3lman
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 15 hours ago · details
more →