404 | How I Used JS files inspection and Fuzzing to do admins/supports stuff |
Broken Access Control |
NA |
Fares Walid (@SirBagoza) |
Bug Bounty | 2023-02-23 | 2023-06-13 |
355 | Unauthorized Access To Admin Panel via Swagger |
Missing authentication
Broken Access Control |
Coca-Cola |
Arman (@M7arm4n) |
Bug Bounty | 2023-03-04 | 2023-06-13 |
353 | 30-Minute Heist: How I Bagged a $1500 Bounty in Just few Minutes! |
Broken Access Control
Logic flaw |
NA |
Charlie : The Hacker |
Bug Bounty | 2023-03-04 | 2023-06-13 |
347 | Exposing Users Table From a Leaky GraphQL Query |
GraphQL
Authorization flaw
Broken Access Control |
NA |
Inderjeet Singh - encodedguy (@3nc0d3dGuY) |
Bug Bounty | 2023-03-06 | 2023-06-13 |
335 | Unauthorized access to Codespace secrets in GitHub |
Logic flaw
Broken Access Control
Account takeover |
GitHub |
Ophion Security (@OphionSecurity) |
Bug Bounty | 2023-03-07 | 2023-06-13 |
310 | The Time I Hacked Google’s Manual Actions Database |
Broken Access Control
Authorization flaw |
Google |
Tom Anthony (@TomAnthonySEO) |
Bug Bounty | 2023-03-13 | 2023-06-13 |
268 | Joomla! CVE-2023-23752 to Code Execution |
Broken Access Control
RCE |
Joomla! |
Jacob Baines (@Junior_Baines) |
Bug Bounty | 2023-03-23 | 2023-06-13 |
259 | High severity vulnerability fixed in WordPress Elementor Pro plugin. |
Broken Access Control
Privilege Escalation
Security code review |
Elementor |
Jerome Bruandet |
Bug Bounty | 2023-03-28 | 2023-06-13 |
213 | Account Take Over (Via an API) |
Account takeover
Information disclosure
Broken Access Control
Cryptographic issues |
NA |
Thabiso Mokoena |
Bug Bounty | 2023-04-10 | 2023-06-13 |
196 | From Django Debug Mode to PII Data Leak of more than 500+ Employees due Broken Access Control and IDOR |
Debug mode enabled
IDOR
Information disclosure
JWT
Broken Access Control
Exposed registration page |
NA |
Aayush Vishnoi (@AayushVishnoi10) |
Bug Bounty | 2023-04-14 | 2023-06-13 |
183 | How Material Security Uncovered a Vulnerability in the Gmail API |
Broken Access Control
Authorization flaw |
Google |
Chris Long (@Centurion) |
Bug Bounty | 2023-04-18 | 2023-06-13 |
166 | Exploits Explained: Permission misconfiguration within Salesforce JavaScript Remoting tokens used for Apex Controllers |
Salesforce
Security misconfiguration
Broken Access Control |
NA |
Mahmoud Gamal (@Zombiehelp54) |
Bug Bounty | 2023-04-21 | 2023-06-13 |
103 | What is kong & why we’re relying on it |
RCE
Sandbox escape
Authentication bypass
Hardcoded credentials
Broken Access Control
Privilege escalation
JWT |
Konga |
Laluka (@TheLaluka) |
Bug Bounty | 2023-05-10 | 2023-06-13 |