wakatime.com
api.wakatime.com (web only, not used for email)
Please test image uploads first, since most other features have already been tested thoroughly:
https://wakatime.com/settings/profile/photo
Vulnerabilities below will be marked NA or Informative.
Session Fixation (We use session cookies and we like them http://bit.ly/2tw19Gd)
Insufficient Session Expiration
Weak Password Policy (See http://bit.ly/2uFjwXt)
Password Reuse (We allow any password, even passwords used previously)
CSRF Cookie Without 'HttpOnly' Flag
Beast Attack (Fixed in browsers not sever)
Username Enumeration
Software version disclosure
Denial of service
Spamming
Phishing
Social engineering
Please consolidate the same vulnerability reports when only the page/url/params changes.
The progam has been crawled by Firebounty on 2017-06-29 and updated on 2019-08-06, 194 reports have been received so far.
FireBounty © 2015-2024