The 10 vulnerabilities discovered by bug bounty hunters

A bug bounty is a monetary prize an organization offers to moral programmers for finding weaknesses. A Capture the Flag, or CTF, is a game where programmers contend to discover messes with and tackle security puzzles. Bug bounty programs use installments to boost programmers from around the world to scrutinize frameworks. There is no restriction to the quantity of bugs programmers can uncover, making a difficult and broad chance for programmers.

Here is the list of most awarded vulnerabilities for Bug Bounty Hunter

  1. Cross-site Scripting (XSS)
  2. Improper Access Control 
  3. Information Disclosure
  4. Server-Side Request Forgery (SSRF)
  5. Insecure Direct Object Reference (IDOR)
  6. Privilege Escalation
  7. SQL Injection
  8. Improper Authentication 
  9. Code Injection
  10. Cross-Site Request Forgery (CSRF)

Leave a Reply