Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Bug Bounty Intelligence

Source: HackerOne public disclosures · updated every 6h

Browse publicly disclosed bug bounty reports from HackerOne. Filter by severity, weakness type, or program. Cross-referenced with CVE IDs where available.

Disclosed Reports
12,219
CVE-linked
1,854
Programs
342
New This Week
10
Enable 2FA without verifying the email
XVIDEOS Improper Access Control - Generic (CWE-284)
Low
2025-05-09
Medium
2025-05-08
Critical
2025-05-07
Critical
2025-05-07
HTTP/3 Stream Dependency Cycle Exploit
curl Improper Input Validation (CWE-20)
High
2025-05-04
None
2025-05-03
Low
2025-05-02
Critical
2025-05-02
High
2025-04-30
Privilege Persistence via Cloned Agent
Dust Improper Access Control - Generic (CWE-284)
Medium
2025-04-30
Use of a Broken or Risky Cryptographic Algorithm (CWE-327) in libcurl
curl Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
Unknown
2025-04-29
Information disclosure on IBM training service endpoint
IBM Insecure Direct Object Reference (IDOR) (CWE-639)
Unknown
2025-04-29
Top Weakness Types
Most Active Programs
ProgramReportsMax $
U.S. Dept Of Defense896
Internet Bug Bounty817
HackerOne609
Nextcloud582
Shopify464
curl439
Node.js third-party modules307
GitLab258
X / xAI250 $2,500
Uber239 $9,895