bug-bounty480
google297
xss277
microsoft249
facebook211
rce159
apple150
exploit136
bragging-post102
account-takeover98
malware94
csrf84
cve79
privilege-escalation74
authentication-bypass65
stored-xss65
writeup61
reflected-xss57
browser54
react53
ssrf51
phishing50
dos50
input-validation49
cloudflare49
access-control49
cross-site-scripting48
node46
aws46
smart-contract45
docker45
sql-injection45
ethereum44
defi43
web-security43
web-application42
supply-chain42
oauth41
web339
burp-suite36
lfi34
vulnerability-disclosure34
idor34
html-injection33
smart-contract-vulnerability32
race-condition32
clickjacking31
reverse-engineering31
information-disclosure30
csp-bypass30
0
5/10
bug-bounty
A 2FA bypass vulnerability was discovered on Pandao.ru (Mail.ru's extended program) where CSRF tokens used to disable 2FA never expire, allowing an attacker to reuse the same token to disable 2FA on victim accounts. The vulnerability was reported but no bounty was awarded as the program excludes client-side attacks.
2fa-bypass
csrf
cross-site-request-forgery
client-side-attack
bug-bounty
authentication-bypass
session-management
token-reuse
Mail.ru
Pandao.ru
HackerOne
BurpSuite
Vishal Bharad
0
6/10
tutorial
Educational writeup demonstrating multiple 2FA bypass techniques including SMS OTP redirection via parameter manipulation, token reuse attacks, lack of rate limiting on OTP verification, and expired confirmation token exploitation. Includes case studies from HackerOne and bug bounty programs.
two-factor-authentication-bypass
otp-bypass
authentication-bypass
mobile-verification
account-takeover
api-security
parameter-manipulation
bug-bounty
rate-limiting
token-reuse
brute-force
Gaurav Narwani
HackerOne
Google
Facebook
Skype
Grab
login.gov