bug-bounty

545 articles
sort: new top best
clear filter
0 5/10

A comprehensive guide covering SQL injection fundamentals, exploitation strategies, WAF evasion techniques, and critical payloads for bug bounty hunters.

medium.com · JPablo13 · 2 days ago · details
0
medium.com · Jabaribrown · 2 days ago · details
0
medium.com · El Professor Qais · 2 days ago · details
0 2/10

A bug bounty hunter discovered a payment bypass vulnerability in a premium course platform that allowed obtaining access for $0 through a business logic flaw, but reports a duplicate submission outcome.

medium.com · El Professor Qais · 2 days ago · details
0 7/10

A bug bounty researcher discovered a zero-click account takeover (ATO) vulnerability by chaining an open redirect vulnerability, which they initially overlooked. The writeup details how this seemingly low-severity vulnerability could be weaponized into a critical account compromise attack.

Burp Suite
medium.com · hotisha · 2 days ago · details
0
medium.com · Hithaishi S P · 2 days ago · details
0
vikash-vishnoi.medium.com · Vikash Vishnoi · 2 days ago · details
0
medium.com · montaser mohsen · 2 days ago · details
0 2/10

A bug bounty writeup documenting a CORS misconfiguration vulnerability that led to sensitive data exposure. The article presents a real-world finding from independent security research.

Montaser Mohsen
medium.com · montaser mohsen · 2 days ago · details
0
CVE-2026-21666 CVE-2026-21667 CVE-2026-21669 CVE-2026-21708
bleepingcomputer.com · Sergiu Gatlan · 2 days ago · details
0 2/10

Google announced it paid $17.1 million to 747 security researchers through its Vulnerability Reward Program in 2025, a 40% increase over 2024, with highest single reward of $250,000. The company expanded its program to include new AI vulnerability categories and launched rewards for OSV-SCALIBR, its open-source dependency scanning tool.

Google OSV-SCALIBR MiraclePtr Android Chrome Sergiu Gatlan
bleepingcomputer.com · Sergiu Gatlan · 2 days ago · details
0
mixbanana.medium.com · MixBanana · 3 days ago · details
0 2/10

A security researcher describes a critical multi-tenant isolation vulnerability where access controls completely fail, allowing unauthorized cross-tenant data access or functionality exposure.

Sahar Shlichove
mixbanana.medium.com · MixBanana · 3 days ago · details
0
medium.com · Mehedi Hasan Rafid · 3 days ago · details
0 3/10

Part 167 of a bug bounty hunting guide discussing the Save-Data HTTP header as a potential security research vector, explaining how this header communicates data-saving preferences from client to server.

medium.com · Mehedi Hasan Rafid · 3 days ago · details
0
medium.com · Mehedi Hasan Rafid · 3 days ago · details
0 4/10

Part 166 of a bug bounty hunting guide discussing the RTT (Round Trip Time) Client Hint header and its potential security implications for web applications.

medium.com · Mehedi Hasan Rafid · 3 days ago · details
0
medium.com · Bugitrix · 3 days ago · details
0 2/10

A bug bounty bragging post claiming a $500 payout for finding an open redirect vulnerability, with minimal technical details provided beyond the title.

medium.com · Bugitrix · 3 days ago · details
0
0 4/10

A beginner-focused guide on using OWASP ZAP to automate web application security testing for bug bounty hunting.

OWASP ZAP Ghostyjoe
medium.com · ghostyjoe · 3 days ago · details
0
hunterx461.medium.com · Tabrez Mukadam · 3 days ago · details
more →