Expedia Group Bug Bounty - HackerOne Reports
View on HackerOne6
Total Reports
0
Critical
2
High
2
Medium
2
Low
Open Redirect in Logout & Login
Reported by:
qualw1n
|
Disclosed:
Medium
Weakness: Open Redirect
Bounty: $1000.00
https://www.wotif.com/vc/blog/info.php script is prone to reflected HTML/CSS injection and COOKIE leak
Reported by:
maskopatol
|
Disclosed:
Low
Weakness: Code Injection
Bounty: $100.00
Cache Poisoning Allows Stored XSS Via hav Cookie Parameter (To Account Takeover)
Reported by:
bombon
|
Disclosed:
High
Weakness: Cross-site Scripting (XSS) - Stored
Sensitive information for phpinfo.php at https://products.ean.com/
Reported by:
exploitmsf
|
Disclosed:
Low
Weakness: Information Disclosure
Cache Deception Allows Account Takeover
Reported by:
bombon
|
Disclosed:
High
Weakness: Use of Cache Containing Sensitive Information
Reflected XSS Via origCity Parameter (UPPER Case + WAF Protection Bypass)
Reported by:
bombon
|
Disclosed:
Medium
Weakness: Cross-site Scripting (XSS) - Reflected