All Bounties
Browse 106 vulnerability reports across all programs.
106 bounties found
| ID | Company | Title | Severity | Category | Status | Reward | Subs |
|---|---|---|---|---|---|---|---|
| GOOG-001 | Stored XSS via malformed Gmail attachment filename | High | XSS | Open | $5,000–$10,000 | 2 | |
| GOOG-002 | CSRF on Google Cloud IAM role assignment endpoint | Critical | CSRF | In Review | $10,000–$31,337 | 1 | |
| GOOG-003 | OAuth token leakage via redirect_uri mismatch in GCP console | High | Authentication Bypass | Open | $5,000–$10,000 | 0 | |
| MSFT-001 | Privilege escalation in Azure Active Directory via Graph API | Critical | Authorization Flaw | Open | $15,000–$250,000 | 0 | |
| MSFT-002 | Remote code execution in Office 365 macro sandbox escape | Critical | RCE | In Review | $15,000–$250,000 | 3 | |
| MSFT-003 | SSRF in Azure DevOps pipeline webhook handler | High | SSRF | Resolved | $5,000–$15,000 | 4 | |
| AAPL-001 | iCloud authentication bypass via manipulated recovery flow | Critical | Authentication Bypass | Open | $50,000–$200,000 | 0 | |
| AAPL-002 | Kernel memory disclosure in macOS Bluetooth stack | High | Data Leakage | In Review | $25,000–$100,000 | 2 | |
| META-001 | Account takeover via Facebook OAuth race condition | Critical | Authentication Bypass | Resolved | $30,000–$100,000 | 5 | |
| META-002 | Instagram API IDOR leaking private profile data | High | IDOR | Open | $10,000–$25,000 | 1 | |
| META-003 | Stored XSS in WhatsApp Web link preview renderer | High | XSS | Open | $10,000–$30,000 | 0 | |
| AMZN-001 | SSRF via image processing in product review uploads | High | SSRF | Open | $5,000–$15,000 | 1 | |
| AMZN-002 | Price manipulation via race condition in checkout API | Critical | Business Logic | In Review | $10,000–$25,000 | 2 | |
| TSLA-001 | Vehicle API command injection via crafted trip name | High | SQL Injection | Open | $5,000–$15,000 | 0 | |
| TSLA-002 | Authentication bypass in Supercharger session management | Critical | Authentication Bypass | In Review | $10,000–$15,000 | 1 | |
| SHOP-001 | Checkout price manipulation via discount code race condition | Critical | Business Logic | Open | $15,000–$50,000 | 0 | |
| SHOP-002 | Stored XSS in merchant admin theme editor | High | XSS | Resolved | $5,000–$10,000 | 3 | |
| STRP-001 | Payment intent amount mismatch via concurrent API calls | Critical | Business Logic | Open | $15,000–$50,000 | 0 | |
| STRP-002 | Webhook signature bypass via timing attack | High | Cryptographic Issue | In Review | $5,000–$15,000 | 2 | |
| CB-001 | Double-spend via race condition in withdrawal API | Critical | Business Logic | Open | $50,000–$250,000 | 0 | |
| CB-002 | IDOR in user portfolio API leaking balances | High | IDOR | In Review | $10,000–$30,000 | 1 | |
| CB-003 | XSS via crafted token name on Base explorer | Medium | XSS | Open | $2,000–$5,000 | 2 | |
| BNB-001 | API key privilege escalation via permission bitmask overflow | Critical | Authorization Flaw | Open | $25,000–$100,000 | 0 | |
| BNB-002 | Order book manipulation via WebSocket message injection | High | API Abuse | In Review | $10,000–$25,000 | 1 | |
| KRK-001 | Withdrawal address whitelist bypass via API parameter pollution | Critical | Authentication Bypass | Open | $25,000–$100,000 | 0 | |
| KRK-002 | Information disclosure in verbose trading error messages | Low | Information Disclosure | Resolved | $200–$500 | 3 | |
| UNI-001 | Smart contract reentrancy in V3 flash loan callback | Critical | Smart Contract | Open | $100,000–$500,000 | 0 | |
| UNI-002 | Frontend price display manipulation via crafted token metadata | Medium | Price Manipulation | In Review | $2,000–$5,000 | 2 | |
| OS-001 | NFT listing price manipulation via Seaport order signature replay | Critical | Smart Contract | Open | $15,000–$50,000 | 0 | |
| OS-002 | IDOR in collection stats API exposing hidden listings | Medium | IDOR | Resolved | $2,000–$5,000 | 4 | |
| DSC-001 | Remote code execution via crafted embed in desktop client | Critical | RCE | Open | $10,000–$20,000 | 0 | |
| DSC-002 | OAuth2 token theft via open redirect in authorization flow | High | Open Redirect | In Review | $3,000–$8,000 | 1 | |
| SLK-001 | Message content leakage via shared channel API misconfiguration | High | Data Leakage | Open | $3,000–$10,000 | 0 | |
| ZM-001 | Meeting takeover via predictable meeting ID generation | Critical | Authentication Bypass | Resolved | $15,000–$50,000 | 6 | |
| ZM-002 | Screen share data exfiltration via malicious virtual background | High | Data Leakage | Open | $5,000–$15,000 | 0 | |
| DBX-001 | File access bypass via shared link token prediction | High | Authorization Flaw | Open | $5,000–$15,000 | 1 | |
| GH-001 | Actions workflow injection via crafted PR title in public repos | High | RCE | Open | $10,000–$30,000 | 0 | |
| GH-002 | Private repository name disclosure via API error messages | Medium | Information Disclosure | In Review | $1,000–$3,000 | 2 | |
| GH-003 | CSRF on repository settings allowing branch protection bypass | High | CSRF | Open | $5,000–$15,000 | 0 | |
| GL-001 | CI pipeline secret exfiltration via malicious .gitlab-ci.yml | Critical | Data Leakage | Open | $10,000–$20,000 | 0 | |
| CF-001 | WAF bypass via chunked transfer encoding edge case | Critical | API Abuse | Open | $15,000–$50,000 | 0 | |
| CF-002 | Workers KV data leakage via timing side-channel | High | Data Leakage | In Review | $5,000–$15,000 | 1 | |
| FIG-001 | Stored XSS via SVG import in design file | High | XSS | Open | $3,000–$10,000 | 0 | |
| NOT-001 | IDOR in workspace API allowing unauthorized page access | High | IDOR | Open | $2,000–$5,000 | 1 | |
| CNV-001 | SSRF via external image URL in template editor | High | SSRF | Open | $3,000–$10,000 | 0 | |
| RED-001 | Account takeover via password reset token prediction | Critical | Authentication Bypass | In Review | $10,000–$20,000 | 2 | |
| RED-002 | Stored XSS in subreddit custom CSS parser | High | XSS | Open | $3,000–$8,000 | 0 | |
| X-001 | DM content leakage via API pagination vulnerability | High | Data Leakage | Open | $5,000–$15,000 | 0 | |
| X-002 | Account suspension bypass via API parameter manipulation | Medium | Authorization Flaw | In Review | $1,000–$5,000 | 1 | |
| LI-001 | Private profile data exposure via recruiter search API | High | Data Leakage | Open | $5,000–$15,000 | 0 | |
| NFLX-001 | DRM bypass via modified playback API request headers | Critical | Cryptographic Issue | In Review | $10,000–$20,000 | 1 | |
| NFLX-002 | Account sharing detection bypass via cookie manipulation | Medium | Authentication Bypass | Open | $2,000–$5,000 | 0 | |
| SPOT-001 | Premium feature bypass via modified API client headers | High | Authorization Flaw | Open | $3,000–$10,000 | 0 | |
| UBER-001 | Fare manipulation via GPS spoofing in rider API | Critical | Business Logic | Open | $10,000–$50,000 | 0 | |
| UBER-002 | Driver identity verification bypass in onboarding flow | High | Authentication Bypass | In Review | $5,000–$15,000 | 2 | |
| ABNB-001 | Payment diversion via host payout API manipulation | Critical | Business Logic | Open | $10,000–$25,000 | 0 | |
| PP-001 | Transaction amount modification via concurrent API race condition | Critical | Business Logic | Open | $15,000–$30,000 | 0 | |
| PP-002 | Venmo private transaction exposure via API enumeration | High | IDOR | Resolved | $5,000–$10,000 | 5 | |
| SQ-001 | Cash App payment interception via deep link hijacking | Critical | Authentication Bypass | Open | $10,000–$15,000 | 0 | |
| RH-001 | Options trading restriction bypass via API parameter injection | High | Authorization Flaw | Open | $5,000–$15,000 | 0 | |
| RH-002 | Portfolio value manipulation via stale price cache | Medium | Price Manipulation | In Review | $2,000–$5,000 | 1 | |
| REV-001 | Currency exchange rate arbitrage via API timing exploit | Critical | Business Logic | Open | $5,000–$10,000 | 0 | |
| AXM-001 | Private key extraction via malicious token metadata in wallet connector | Critical | Authentication Bypass | Open | $20,000–$75,000 | 0 | |
| AXM-002 | Order spoofing via unsigned transaction injection in limit order flow | Critical | Business Logic | Open | $20,000–$75,000 | 0 | |
| AXM-003 | Front-running attack via MEV exposure in trade execution API | Critical | Smart Contract | In Review | $20,000–$75,000 | 1 | |
| AXM-004 | IDOR on copy trading — subscribe to private strategy without approval | High | Authorization Flaw | Open | $5,000–$20,000 | 0 | |
| AXM-005 | CORS misconfiguration exposes authenticated trade history to third-party origins | High | Data Leakage | Open | $5,000–$20,000 | 0 | |
| AXM-006 | Slippage bypass via manipulated price oracle in swap router | Critical | Price Manipulation | Open | $20,000–$75,000 | 0 | |
| AXM-007 | API rate limit bypass enabling high-frequency scraping of order book | Medium | API Abuse | Open | $1,000–$5,000 | 2 | |
| AXM-008 | XSS via unsanitized token symbol in portfolio P&L display | High | XSS | Open | $5,000–$20,000 | 0 | |
| ARKM-001 | IDOR on Intel Exchange — access rival analyst's private intel reports | Critical | Authorization Flaw | Open | $20,000–$100,000 | 0 | |
| ARKM-002 | API key leakage via GraphQL introspection on entity resolution endpoint | High | Data Leakage | Open | $5,000–$20,000 | 1 | |
| ARKM-003 | SSRF via webhook URL parameter in alert subscription flow | Critical | SSRF | In Review | $20,000–$100,000 | 2 | |
| ARKM-004 | Address labeling spoofing via crafted ENS metadata injection | High | Business Logic | Open | $5,000–$20,000 | 0 | |
| ARKM-005 | Stored XSS in custom dashboard widget via unsanitized token name | High | XSS | Open | $5,000–$20,000 | 0 | |
| ARKM-006 | ARKM token transfer bypass via signature replay on Intel Exchange | Critical | Smart Contract | Open | $20,000–$100,000 | 0 | |
| ARKM-007 | Rate limit bypass on bulk address lookup API | Medium | API Abuse | Open | $1,000–$5,000 | 0 | |
| ARKM-008 | Authentication bypass via JWT algorithm confusion on /api/v2/user | Critical | Authentication Bypass | Open | $20,000–$100,000 | 0 | |
| ARKM-009 | Private entity attribution data exposed via misconfigured S3 bucket | Critical | Data Leakage | In Review | $20,000–$100,000 | 3 | |
| BM-001 | Wallet graph data poisoning via crafted on-chain metadata | Critical | Data Leakage | Open | $10,000–$50,000 | 0 | |
| BM-002 | API key leakage via CORS misconfiguration on data endpoints | High | Data Leakage | Open | $5,000–$15,000 | 1 | |
| BM-003 | SSRF via token contract address parameter in enrichment API | Critical | SSRF | In Review | $10,000–$50,000 | 2 | |
| BM-004 | Stored XSS in bubble label rendering via token symbol injection | High | XSS | Open | $5,000–$15,000 | 0 | |
| BM-005 | Rate limit bypass on /api/v2/bubble-map endpoint | Medium | API Abuse | Open | $1,000–$5,000 | 0 | |
| BM-006 | Smart contract supply tracking manipulation via forked chain data | Critical | Business Logic | Open | $10,000–$50,000 | 0 | |
| BM-007 | Authentication bypass on private map share link | High | Authentication Bypass | Open | $5,000–$15,000 | 0 | |
| BM-008 | SQL injection via chain filter parameter in analytics API | Critical | SQL Injection | Open | $10,000–$50,000 | 0 | |
| DS-001 | XSS via token name rendering on pair page | Critical | XSS | Open | $5,000–$15,000 | 0 | |
| DS-002 | CSRF on watchlist API endpoint | High | CSRF | In Review | $2,000–$5,000 | 3 | |
| DS-003 | API rate-limit bypass on /tokens/v1 endpoint | High | API Abuse | Open | $2,000–$5,000 | 1 | |
| DS-004 | Fake price display via manipulated LP data | Critical | Price Manipulation | Resolved | $5,000–$15,000 | 5 | |
| DS-005 | WebSocket feed injection causing stale chart data | Medium | Data Leakage | Open | $500–$2,000 | 0 | |
| AAVE-001 | Flash loan oracle manipulation via price feed delay | Critical | Smart Contract | Open | $50,000–$250,000 | 0 | |
| AAVE-002 | GHO facilitator cap bypass via reentrancy in mint function | Critical | Smart Contract | In Review | $50,000–$250,000 | 1 | |
| LINK-001 | Oracle price manipulation via compromised data source aggregation | Critical | Smart Contract | Open | $25,000–$100,000 | 0 | |
| MATIC-001 | Bridge fund extraction via crafted merkle proof | Critical | Smart Contract | Open | $50,000–$100,000 | 0 | |
| MATIC-002 | zkEVM state transition verification bypass | Critical | Smart Contract | In Review | $50,000–$100,000 | 1 | |
| SOL-001 | Validator consensus manipulation via crafted vote transactions | Critical | Smart Contract | Open | $100,000–$400,000 | 0 | |
| SOL-002 | SPL Token account authority hijack via program upgrade | Critical | Authorization Flaw | In Review | $50,000–$200,000 | 1 | |
| ETH-001 | Consensus layer attestation forging via BLS signature malleability | Critical | Cryptographic Issue | Open | $100,000–$500,000 | 0 | |
| ARB-001 | Sequencer censorship via crafted transaction batching | High | Business Logic | Open | $10,000–$50,000 | 0 | |
| DYDX-001 | Liquidation price manipulation via oracle delay exploit | Critical | Price Manipulation | Open | $25,000–$150,000 | 0 | |
| INCH-001 | Swap routing manipulation extracting excess user tokens | Critical | Smart Contract | Open | $15,000–$50,000 | 0 | |
| JUP-001 | Quote API manipulation returning inflated swap amounts | High | API Abuse | Open | $5,000–$20,000 | 0 | |
| JUP-002 | DCA order front-running via predictable execution timing | Medium | Business Logic | In Review | $2,000–$10,000 | 1 | |
| RAY-001 | Concentrated liquidity pool drain via tick manipulation | Critical | Smart Contract | Open | $15,000–$50,000 | 0 |