Skip to content

Latest commit

 

History

History
109 lines (109 loc) · 12 KB

File metadata and controls

109 lines (109 loc) · 12 KB

Reports in mtn group program:

S.No Title Bounty
1 Upload directory of Mtn.ci $0.0
2 Upload directory of Mtn.co.sz has listing enabled $0.0
3 Information Disclosure FrontPage Configuration Information /_vti_inf.html in https://www.mtn.co.za/ $0.0
4 Information Disclosure Microsoft IIS Server service.cnf in a mtn website $0.0
5 OTP bypass - Unintended disclosure of OTP to client allows attacker to manage users' subscriptions $0.0
6 Account Take over of millions of MTN users account due to lack of Rate limiting when sending OTP code $0.0
7 Unsafe cors sharing of admin users $0.0
8 SQL Injection on cookie parameter $0.0
9 Week Passwords generated by password reset function $0.0
10 SharePoint exposed web services in a subdomain $0.0
11 Accessible Restricted directory on [bcm-bcaw.mtn.cm] $0.0
12 Java Debug Console Provides Command Injection Without Privellage Esclation $0.0
13 Remote OS Command Execution on Oracle Weblogic server via [CVE-2017-3506] $0.0
14 Remote OS Command Execution on Oracle Weblogic server via [CVE-2017-10271] $0.0
15 Reflected XSS on mtnhottseat.mtn.com.gh $0.0
16 Reflected XSS on gamesclub.mtn.com.g $0.0
17 Cross-Site Scripting through search form on mtnplay.co.zm $0.0
18 XMLRPC, Enabling XPSA and Bruteforce and DOS + A file disclosing installer-logs. $0.0
19 SQL Injection on the administrator panel $0.0
20 Disclosure of internal information using hidden NTLM authentication leading to an exploit server $0.0
21 Blind SQL Injection $0.0
22 Reflected XSS on play.mtn.co.za $0.0
23 No rate limit lead to otp brute forcing $0.0
24 No rate limit in otp code sending $0.0
25 CVE-2018-6389 exploitation - using scripts loader $0.0
26 Email verification bypassed during sing up (████████) $0.0
27 2x Remote file inclusion within your VMware Instances $0.0
28 information discloure via logs files at ==> https://ihelp.mtnbusiness.com/logfiles/Log_21-06-2021.txt $0.0
29 Unauthenticated Arbitrary File Deletion (CVE-2020-3187) $0.0
30 RCE Apache Struts2 remote command execution (S2-045) on [wifi-partner.mtn.com.gh] $0.0
31 blind sql on [selfcare.mtn.com.af] $0.0
32 SQL injection [futexpert.mtngbissau.com] $0.0
33 [play.mtn.co.za] Application level DoS via xmlrpc.php $0.0
34 Reflected Cross-Site scripting in : mtn.bj $0.0
35 [mtn.com.af] Multiple vulnerabilities allow to Application level DoS $0.0
36 Missing captcha and rate limit protection in help form $0.0
37 RXSS - http://macademy.mtnonline.com $0.0
38 HTML injection in email content during registration via FirstName/LastName parameter $0.0
39 Reflected XSS at dailydeals.mtn.co.za $0.0
40 Reflected XSS on dailydeals.mtn.co.za $0.0
41 PHP Info Exposing Secrets at https://radio.mtn.bj/info $0.0
42 Exposed .bash_history at http://21days2017.mtncameroon.net/.bash_history $0.0
43 Insecure crossdomain.xml on https://vdc.mtnonline.com/ $0.0
44 Insecure Storage of Sensitive Information on lonestarcell.com server $0.0
45 xss on [developers.mtn.com] $0.0
46 XSS at videostore.mtnonline.com/GL/*.aspx via all parameters $0.0
47 XSS at http://nextapps.mtnonline.com/search/suggest/q/{xss payload} $0.0
48 Download full backup [Mtn.co.rw] $0.0
49 POST BASED REFLECTED XSS IN dailydeals.mtn.co.za $0.0
50 Open redirection at https://smartreports.mtncameroon.net $0.0
51 cross site scripting in : mtn.bj $0.0
52 Blind SSRF External Interaction on ████████ $0.0
53 Default Login Credentials on https://broadbandmaps.mtn.com.gh/ $0.0
54 Remote code execution due to unvalidated file upload $0.0
55 Password reset token leak on third party website via Referer header [██████████] $0.0
56 Default Admin Username and Password on remedysso.mtncameroon.net $0.0
57 Sensitive Information Disclosure Through Config File $0.0
58 Wordpress users disclosure from json and xml file $0.0
59 Weak/Auto Fill Password $0.0
60 path traversal vulnerability in Grafana 8.x allows " local file read " $0.0
61 IDOR Leads To Account Takeover Without User Interaction $0.0
62 Information disclosure through django debug mode $0.0
63 Exposed gitlab repo at https://adammanco.mtn.com/api/v4/projects $0.0
64 CVE-2021-38314 @ https://www.mtn.co.rw $0.0
65 CVE-2021-38314 @ https://www.mtn.ci $0.0
66 firebase credentials leaks @ https://mpulse.mtnonline.com $0.0
67 firebase credentials leaks @ ███████ $0.0
68 No password length restriction in reset password endpoint at http://suppliers.mtn.cm $0.0
69 String length restriction byepass at https://callerfeel.mtnonline.com/profile/feedback.html $0.0
70 There is no rate limit for SME REGISTRATION PORTAL $0.0
71 Reflected xss on videostore.mtnonline.com $0.0
72 IDOR [mtnmobad.mtnbusiness.com.ng] $0.0
73 Otp bypass in verifying nin $0.0
74 Cross-site Scripting (XSS) - Reflected $0.0
75 Cross-Site Request Forgery (CSRF) to xss $0.0
76 Reflected XSS in chatbot $0.0
77 Wordpress users Disclosure [ /wp-json/wp/v2/users/ ] $0.0
78 Firebase Database Takeover in https://pulseradio.mtn.co.ug/ $0.0
79 Unprotected Direct Object Reference $0.0
80 Remove Every User, Admin, And Owner Out Of Their Teams on developers.mtn.com via IDOR + Information Disclosure $0.0
81 Authentication bypass in ████████ $0.0
82 Firebase credentials leak $0.0
83 Information Disclosure Leads To User Data Leak $0.0
84 Exposure Of Admin Username & Password $0.0
85 Developer Mistake $0.0
86 Wordpress users Disclosure [ /wp-json/wp/v2/users/ ] Not Resolved () $0.0
87 Remote code execution via crafted pentaho report uploaded using default credentials for pentaho business server $0.0
88 Leaking usernames through endpoints Wordpress $0.0
89 FULL ACCOUNT TAKEOVER $0.0
90 Reflected Cross Site Scripting Cisco ASA on myvpn.mtncameroon.net CVE-2020-3580 $0.0
91 Cross-site Scripting (XSS) - Reflected on http://h1b4e.n2.ips.mtn.co.ug:8080 via Nginx-module $0.0
92 Cross-site Scripting (XSS) - Reflected on http://callertunez.mtn.com.gh/wap/noauth/sharedetail.ftl via callback parameter $0.0
93 Cross-site Scripting (XSS) - Reflected on https://api.mtn.sd/carbon/admin/login.jsp via msgId parameter - CVE-2020-17453 $0.0
94 Remote code injection in Log4j on http://mtn1app.mtncameroon.net - CVE-2021-44228 $0.0
95 Remote code injection in Log4j on https://mymtn.mtncongo.net - CVE-2021-44228 $0.0
96 CVE-2010-1429 JBoss Insecure Storage of Sensitive Information on ips.mtn.co.ug $0.0
97 CVE-2018-0296 Cisco ASA Denial of Service & Path Traversal vulnerable on [mtn.co.ug] $0.0
98 PHP info page disclosure in https://41.242.90.8/ $0.0
99 Reflected cross site scripting (XSS) attacks Reflected XSS attacks, $0.0
100 cross site scripting reflected $0.0
101 Authentication Bypass Leads To Complete Account TakeveOver on ██████████ $0.0
102 IDOR Leads To User Profile Modification https://mtnmobad.mtnbusiness.com.ng/app/updateUser $0.0
103 SSRF Keycloak before 13.0.0 - CVE-2020-10770 on https://sponsoredata.mtn.ci $0.0
104 Reflected XSS in https://nin.mtn.ng/nin/success?message=lol&nin= $0.0
105 IDOR at mtnmobad.mtnbusiness.com.ng leads to PII leakage. $0.0
106 Remote code execution [CVE-2023-36845] $0.0