axe has reached Level 4 with 75+ unique vulnerabilities discovered and they have proven to us that they understand web application vulnerabilities and how to discover them. If you run a bug bounty/vulnerability disclosure program and you are looking for an active, professional researcher, we recommend considering this user
Report Title | Event ID | Severity | Vulnerability Type |
---|---|---|---|
The ref parameter is redirectable in the register.php path | FirstBlood v2 | Informative |
|
Reflective XSS on register page | FirstBlood v2 | Medium | Reflective XSS |
XSS on login page | FirstBlood v2 | Medium | Reflective XSS |
Unexpected registered users | FirstBlood v2 | Medium | Auth issues |
Invalidate previously registered users by using duplicate invitations | FirstBlood v2 | Medium | Auth issues |
Cancel Stored XSS at the reservation function | FirstBlood v2 | High | Stored XSS |
Change user passwords at will to enable account takeover | FirstBlood v2 | CRITICAL | Application/Business Logic |
Regular accounts can override access to patient information | FirstBlood v2 | Medium | Application/Business Logic |
All user information is leaked due to unexpired cookies | FirstBlood v2 | Medium | Application/Business Logic |
Unauthorized modification of mailbox | FirstBlood v2 | Medium | Application/Business Logic |