Reports in ratelimited program: S.No Title Bounty 1 HTTP PUT method enabled $0.0 2 HTTP PUT method enabled $0.0 3 information disclosure which leak the apache version $0.0 4 Banner Grabbing - Apache Server Version Disclousure $0.0 5 Information Disclosure on https://theendlessweb.com/ $0.0 6 Apache Version Disclosure Through Directory Indexing $0.0 7 Editable Wiki repo by anyone $0.0 8 Hackerone1 $0.0 9 Server Header disclose The Os and Web server Version $0.0 10 Open Directory $0.0 11 Exposure of tinyMCE js source code with plugin version disclosure which can leads to exploit further attacks. $0.0 12 Local File Download $0.0 13 Line feed injection in get request leads AWS S3 Bucket information disclosure $0.0 14 HTTP PUT method is enabled ratelimited.me $0.0 15 Missing Protection Mechanism in Mail Servers allows malicious user to use staff.ratelimited.me email could lead to identity theft. $0.0 16 Credientals Over GET method in plain Text $0.0 17 Unrestricted File Upload on https://auth.ratelimited.me $0.0 18 xss in /users/[id]/set_tier endpoint $0.0 19 Cross Site Request Forgery in auth in https://auth.ratelimited.me/ $0.0 20 Information Disclosure PHPpgAdmin $0.0 21 Source code disclosure at ███ $0.0 22 HTTP PUT method is enabled downloader.ratelimited.me $0.0 23 Apache mod_negotiation filename bruteforcing https://api.ratelimited.me $0.0 24 Subdomain takeover in GitLab Pages [george.ratelimited.me] $0.0