| Report Title | Event ID | Severity | Vulnerability Type |
|---|---|---|---|
| IDOR on /api/qa.php | FirstBlood v1 | High | Insecure direct object reference |
| /attendees/event.php authoriation bypass using X-SITE-REQ: permitted | FirstBlood v1 | CRITICAL | Information leak/disclosure |
| Invite Code Leaked on Reddit leading to broken Authorisation | FirstBlood v1 | High | Auth issues |
| Invite codes do not expire after use | FirstBlood v1 | High | Auth issues |
| IDOR on ma.php | FirstBlood v1 | High | Insecure direct object reference |
| IDOR 2 on ma.php - confirms numerical id for bug chain to report 127 without the need for drpanel | FirstBlood v1 | High | Insecure direct object reference |
| Docauth cookie used to amend email - Additionally chained with Rpt 127 and 129 - This is the full report. | FirstBlood v1 | High | Insecure direct object reference |
| CWE-601 Open Redirect on GET /drpanel/logout.php via ref param | FirstBlood v1 | Low | Open Redirect |