bug-bounty

510 articles
sort: new top best
clear filter
0
medium.com · 0 day exploit · 1 day ago · details
0 2/10

An article describing the discovery of a zero-day vulnerability in an Electron-based email viewer application, challenging common assumptions about where critical bugs are typically found.

medium.com · 0 day exploit · 1 day ago · details
0
medium.com · Ankit Rathva aka Gujarati Hacker · 1 day ago · details
0 2/10

A writeup about the author's first bug bounty finding involving an email verification bypass, but the provided excerpt contains no technical details, methodology, or substantive content.

medium.com · Ankit Rathva aka Gujarati Hacker · 1 day ago · details
0
medium.com · Configx · 1 day ago · details
0
0 2/10

A researcher reported a high-severity information disclosure and user enumeration vulnerability to the Dutch government's NCSC-NL, resulting in a fix but only receiving a t-shirt as compensation instead of meaningful bounty.

NCSC-NL Dutch Government
mrtom001.medium.com · Snehil · 2 days ago · details
0
0
medium.com · Rahul Masal · 2 days ago · details
0 5/10

A researcher discovered an API vulnerability in an education platform where replayed API requests could bypass backend restrictions, allowing creation of unlimited schools in the teacher portal.

Rahul Masal
medium.com · Rahul Masal · 2 days ago · details
0 2/10

A bug bounty writeup describing an IDOR vulnerability in a GraphQL API that allowed unauthorized access to personally identifiable information (PII) due to missing authorization controls.

mrtom001.medium.com · Snehil · 2 days ago · details
0
rot-ig.medium.com · Ishant Gupta · 2 days ago · details
0 3/10

Article discusses advanced techniques and methodologies for exploiting IDOR vulnerabilities beyond basic enumeration, targeting authorization flaws in web applications.

rot-ig.medium.com · Ishant Gupta · 2 days ago · details
0
medium.com · Shatha511 · 2 days ago · details
0 3/10

Article discusses techniques and tools for bypassing HTTP 403 Forbidden responses to discover hidden endpoints during bug bounty hunting, using a tool called 403Bypasser.

403Bypasser
medium.com · ghostyjoe · 2 days ago · details
0
medium.com · ghostyjoe · 2 days ago · details
0
evangeliux.medium.com · Evangeliux · 2 days ago · details
0 4/10

A logic flaw was discovered in Meta's Account Center 'This wasn't me' disavow flow that could potentially be exploited for unauthorized account access or control, which Meta later patched.

Meta Account Center
evangeliux.medium.com · Evangeliux · 2 days ago · details
0
medium.com · Bugitrix · 2 days ago · details
0 5/10

A practical guide for bypassing Cloudflare WAF to use Burp Suite during authorized security assessments, providing tested techniques for 2026.

Burp Suite Cloudflare WAF
medium.com · Muhammad Sameer · 2 days ago · details
0
medium.com · loopXvedant · 2 days ago · details
0 4/10

Article describes using Google dorking techniques as a reconnaissance method to discover hidden vulnerabilities and exposed information for bug bounty hunting.

medium.com · loopXvedant · 2 days ago · details
more →