Paragon Initiative Enterprises - HackerOne Reports
View on HackerOne37
Total Reports
5
Critical
2
High
5
Medium
4
Low
Paragonie Airship Admin CSRF on Extensions Pages
Reported by:
4cad
|
Disclosed:
Medium
Weakness: Cross-Site Request Forgery (CSRF)
SMTP server allows anonymous relay from internal addresses to internal addresses
Reported by:
phenix
|
Disclosed:
Weakness: Improper Authentication - Generic
Email Spoofing With Your Website's Email
Reported by:
muhaddix
|
Disclosed:
Weakness: Improper Authentication - Generic
CSRF token does not valided during blog comment
Reported by:
ranjit_p
|
Disclosed:
Weakness: Cross-Site Request Forgery (CSRF)
Improper access control lead To delete anyone comment
Reported by:
ranjit_p
|
Disclosed:
Medium
Weakness: Improper Access Control - Generic
There is an vulnerability in https://bridge.cspr.ng where an attacker can users directory
Reported by:
jalka
|
Disclosed:
Medium
Full Path Disclosure in airship.paragonie.com '/cabins/'
Reported by:
eidelweiss
|
Disclosed:
no session logout after changing the password in https://bridge.cspr.ng/
Reported by:
jalka
|
Disclosed:
Low
Broken Authentication & Session Management - Failure to Invalidate Session on all other browsers at Password change
Reported by:
koviri_jagdish
|
Disclosed:
Critical
Weakness: Improper Authentication - Generic
Incomplete fix for #181225 (target=_blank vulnerability)
Reported by:
cablej
|
Disclosed:
Cross-site-Scripting
Reported by:
test_this
|
Disclosed:
Low
Weakness: Cross-site Scripting (XSS) - Stored
Full Path Disclousure on https://airship.paragonie.com
Reported by:
ruisilva
|
Disclosed:
Low
Weakness: Information Disclosure
directory information disclose
Reported by:
test_this
|
Disclosed:
Weakness: Information Disclosure
I am because bug
Reported by:
b69b1b97b19c1c71b0eed85
|
Disclosed:
Critical
Github repo's wiki publicly editable
Reported by:
whitehat_hacker
|
Disclosed:
Weakness: Improper Access Control - Generic
Invited user to a Author profile can remove the owner of that Author
Reported by:
ranjit_p
|
Disclosed:
Weakness: Violation of Secure Design Principles
BAD Code !
Reported by:
kholy
|
Disclosed:
Weakness: Command Injection - Generic
Subdomain Takeover
Reported by:
kholy
|
Disclosed:
Critical
Weakness: Information Disclosure
Directory Disclose,Email Disclose Zendmail vulnerability
Reported by:
test_this
|
Disclosed:
Weakness: Information Exposure Through Directory Listing
CVEs:
CVE-2016-10034
Recaptcha Secret key Leaked
Reported by:
aif_lill
|
Disclosed:
High
Weakness: Information Disclosure
Page 1 of 2
Next