Â鶹¹ÙÍøÊ×Ò³Èë¿Ú

Acknowledgements

The Â鶹¹ÙÍøÊ×Ò³Èë¿Ú wishes to thank the following Security Researchers who have participated in our Vulnerability Disclosure Programme

2024

Researcher Vulnerability  Date
Broken Access Control Oct 2024
Vulnerable and Outdated Components Sept 2024
Insecure Design August 2024
Injection August 2024
Broken Access Control August 2024
Insecure Design August 2024
Security Misconfiguration July 2024
Vulnerable and Outdated Components July 2024
Vulnerable and Outdated Components July 2024
Security Misconfiguration July 2024
Injection July 2024
Insecure Design July 2024
Injection June 2024
Insecure Design June 2024
Insecure Design June 2024
Insecure Design  June 2024
Injection May 2024
Security Misconfiguration May 2024
Broken Access Control May 2024
Security Misconfiguration May 2024
Security Misconfiguration May 2024
Sensitive Information Disclosure May 2024
Sensitive Information Disclosure May 2024
Security Misconfiguration April 2024
Security Misconfiguration April 2024
Security Misconfiguration April 2024
Sensitive Information Disclosure April 2024
Security Misconfiguration April 2024
Injection April 2024
Information Disclosure April 2024
Security Misconfiguration March 2024
Insecure Design March 2024
Broken Access Control March 2024
Information Disclosure  February 2024
Security Misconfiguration February 2024
Injection February 2024
Broken Authentication February 2024
Injection January 2024
Security Misconfiguration January 2024

 

2023

Researcher                               Vulnerability                                   Date                         
Security misconfiguration  Dec 2023
Injection Dec 2023
Insecure Design Dec 2023
Injection Dec 2023
Injection Dec 2023
Injection Dec 2023
Injection Dec 2023
Security Misconfiguration Dec 2023
Data Integrity Dec 2023
Insecure Design Nov 2023
Broken Access Control Nov 2023
Broken Access Control Nov 2023
Insecure Design Nov 2023
Broken Access Control Nov 2023
Injection Nov 2023
Insecure Design Nov 2023
Broken Access Control Nov 2023
Injection Oct 2023
Data Integrity Oct 2023
Insecure Design Oct 2023
Broken Access Control Oct 2023
Broken Access Control Oct 2023
Injection Oct 2023
Insecure Design Oct 2023
Security Misconfiguration Oct 2023
Injection Oct 2023
Outdated Components Sept 2023
Injection Sept 2023
Security Misconfiguration Sept 2023
Outdated Components Sept 2023
Outdated Components Aug 2023
Injection Aug 2023
Insecure Design July 2023
Injection July 2023
Injection July 2023
Security Misconfiguration June 2023
Injection June 2023
Broken Access Control June 2023
Outdated Components June 2023
Insecure Design June 2023
Insecure Design May 2023
Injection May 2023
Outdated Components May 2023
Outdated Components May 2023
Injection May 2023
Injection April 2023
Jose Carlos Exposito Bueno Security Misconfiguration April 2023
Injection April 2023
Insecure Design March 2023
Injection March 2023
Injection March 2023
Insecure Design March 2023
Broken Access Control March 2023
Broken Access Control March 2023
Injection March 2023
Data Integrity March 2023
Injection March 2023
Injection March 2023
Injection Feb 2023
Server-Side Request Forgery Feb 2023
Server-Side Request Forgery Jan 2023
Injection Jan 2023
Injection Jan 2023
Injection Jan 2023
Injection Jan 2023
 & Petter Olsen Data Integrity Jan 2023
Injection Jan 2023
Broken Access Control Jan 2023
Injection Jan 2023

 

2022

Researcher Vulnerability Date
Insecure Design Dec 2022
Injection Dec 2022
Injection Nov 2022
Injection Nov 2022
Data Integrity Nov 2022
Injection Oct 2022
Injection Sept 2022
Injection Aug 2022
Insecure Design July 2022
Injection July 2022
Data Integrity July 2022
Injection July 2022
Broken Access Control July 2022
Data Integrity Jun 2022
Injection May 2022
Jordan Glover Data Integrity Apr 2022
Broken Access Control Mar 2022
Injection Mar 2022
Insecure Design Feb 2022
Information Disclosure Jan 2022
Information Disclosure Jan 2022
                        Security Misconfiguration Jan 2022                   

 

2021

Researcher Vulnerability

Date

Injection Dec 2021
Remote Code Execution Dec 2021
Remote Code Execution Dec 2021
Remote Code Execution Nov 2021
Remote Code Execution Nov 2021
Remote Code Execution Nov 2021
Remote Code Execution Nov 2021
Data Integrity Nov 2021
Data Integrity Nov 2021
Server-Side Request Forgery Oct 2021
Security Misconfiguration Oct 2021
Security Misconfiguration Oct 2021
Insecure Design Oct 2021
Insecure Design Oct 2021
Security Misconfiguration Sept 2021
Data Integrity Aug 2021
Broken Access Control Aug 2021
Broken Access Control Aug 2021
Data Integrity Aug 2021
Injection Aug 2021
Injection Aug 2021
Vulnerable Components Aug 2021
Data Integrity Aug 2021
Data Integrity Aug 2021
Broken Access Control Aug 2021
Data Integrity Aug 2021
Data Integrity Aug 2021
Vulnerable Components Aug 2021
Injection Aug 2021
Security Misconfiguration Aug 2021
Injection Aug 2021
Vulnerable Components Aug 2021
Injection Aug 2021
Security Misconfiguration July 2021
Insecure Design July 2021
Insecure Design July 2021
Data Integrity July 2021
Insecure Design July 2021
Data Integrity July 2021
Insecure Design July 2021
Outdated Components July 2021
Injection June 2021
Injection June 2021
Injection June 2021
Broken Access Control June 2021
Avdi Zumeray Broken Access Control June 2021
Data Integrity June 2021
Broken Access Control June 2021
Broken Access Control June 2021
Injection May 2021
Injection May 2021
Security Misconfiguration May 2021
Vulnerable Components May 2021
Injection April 2021
Broken Access Control April 2021
Vulnerable Components March 2021
Data Integrity March 2021
Insecure Design March 2021
Security Misconfiguration March 2021
Data Integrity March 2021
Injection March 2021
Injection March 2021
Security Misconfiguration March 2021
Injection March 2021
Security Misconfiguration March 2021
Security Misconfiguration February 2021
Injection February 2021
Data Integrity February 2021
Vulnerable Components January 2021
Injection January 2021
Data Integrity January 2021
Injection January 2021
Security Misconfiguration January 2021

2020

Researcher Vulnerability

Date

Injection December 2020
Data Integrity December 2020
Taha Bıyıklı Injection December 2020
Injection December 2020
Injection November 2020
Vulnerable Components November 2020
Security Misconfiguration November 2020 
Insecure Design November 2020
Data Integrity November 2020
Injection November 2020
Vulnerable Components November 2020
Brijesh Pandya Injection November 2020
Injection November 2020
Vulnerable Components November 2020
Vulnerable Components November 2020
Injection November 2020
Injection November 2020
Injection October 2020
Insecure Design October 2020
Kasper Karlsson Injection October 2020
Benjamin Barnes (Magna) Injection October 2020
Injection October 2020
Injection October 2020
Injection October 2020
Injection October 2020
Bharat (Mr.NOOB) Multiple Vulnerabilities October 2020
Nathan Jones Data Integrity October 2020
Insecure Design October 2020
Injection September 2020
Data Integrity September 2020
Data Integrity September 2020
Server side request forgery September 2020
Injection September 2020
Injection September 2020
Injection September 2020
Daniel Lidén Injection September 2020
Injection September 2020
Insecure Design August 2020
d3vpoo1 Server-Side Request Forgery August 2020
Keshav Malik Insecure Design August 2020
Data Integrity August 2020
Injection August 2020
Data Integrity August 2020
Insecure Design July 2020
Broken Access Control July 2020
Broken Access Control July 2020
Data Integrity July 2020
Security Misconfiguration July 2020
Data Integrity July 2020
Injection July 2020
Security Misconfiguration June 2020
Data Integrity June 2020
Data Integrity June 2020
Security Misconfiguration June 2020
Data Integrity May 2020
Insecure Design May 2020
Insecure Design May 2020
Vulnerable Components May 2020
Security Misconfiguration April 2020
Insecure Design April 2020
Injection April 2020
Injection April 2020
Syed Muhammad Asim Injection February 2020
Security Misconfiguration January 2020
Data Integrity January 2020
Injection January 2020
Data Integrity January 2020
Injection January 2020
Data Integrity January 2020
Injection January 2020
Vulnerable Components January 2020
Injection January 2020
Insecure Design January 2020

2019

Researcher Vulnerability

Date

Data Integrity December 2019
Injection December 2019
Injection December 2019
Injection November 2019
Insecure Design October 2019
Safak Aslan Injection October 2019
Injection September 2019
Security Misconfiguration August 2019
Injection July 2019
Injection May 2019
Injection May 2019
Injection May 2019
Injection May 2019
Injection April 2019
Injection April 2019 
Injection April 2019
Injection March 2019
Injection March 2019
Vineet Kumar Security Misconfiguration March 2019
Injection March 2019
Data Integrity March 2019
Injection March 2019
Broken Access Control February 2019
B. Franklin Security Misconfiguration February 2019
Nicholas Dine Injection February 2019
Broken Access Control January 2019
Injection January 2019

2018 

Researcher Vulnerability Date
Injection December 2018
Injection December 2018
Injection November 2018
Injection November 2018
Injection November 2018
Pranshu Tiwari  Injection November 2018
Injection October 2018
Diego Moicano Injection October 2018
Security Misconfiguration October 2018
Injection October 2018 
Sébastien Kaul Security Misconfiguration October 2018 
Security Misconfiguration September 2018
Puneet Kumar Maurya Security Misconfiguration September 2018
Injection September 2018
Dhiraj Mishra Insecure Design September 2018 
Data Integrity September 2018 
Kunal Bahl Insecure Design September 2018 
Insecure Design September 2018 
Kenan GUMUS Injection September 2018 
B.Dhiyaneshwaran Data Integrity September 2018 
Broken Access Control August 2018
Security Misconfiguration August 2018
Security Misconfiguration August 2018
Thijs Baart Injection August 2018
Injection August 2018
Sam Gilder Insecure Design August 2018
Nicolas Francois Injection August 2018
Injection August 2018
Data Integrity August 2018
Christoph Kisfeld Injection August 2018
Injection August 2018 
Data Integrity August 2018 
Deepak R Pandey Broken Access Control August 2018
Ashutosh Barot Data Integrity July 2018

2017

Researcher Vulnerability

Date

Injection February 2017

Information for reporters

Please note that we are currently backfilling this page with reporter information. If you have reported a vulnerability which has been accepted and your details are not here already but you would like them to be, please contact security@bbc.co.uk and include the reference number you were provided with along with the name/handle and a link to a social media account if you wish that to appear here.

The Â鶹¹ÙÍøÊ×Ò³Èë¿Ú relies on consent to publish the personal information of researchers online. We will include a link to the researchers’ social media profiles, but only if the researcher asks us to do so. The researcher can withdraw their consent at any time by contacting security@bbc.co.uk. For further information about how the Â鶹¹ÙÍøÊ×Ò³Èë¿Ú processes your personal information including your rights under data protection law, please see the Â鶹¹ÙÍøÊ×Ò³Èë¿Ú’s privacy policy.

Website links

Please note that we only link to security researcher social media profiles. Our trust model does not enable us to link to other websites. Currently LinkedIn, Twitter(X), Instagram, Facebook and HackerOne profile links are accepted. Other social media sites will be reviewed and considered at point of request. Mastodon is a de-centralised system and therefore we will reference handles (please ensure you include the @server element), but will not include hyperlinks as we cannot guarantee the safety of the profile being linked to.

Rebuild Page

The page will automatically reload. You may need to reload again if the build takes longer than expected.

Useful links

Theme toggler

Select a theme and theme mode and click "Load theme" to load in your theme combination.

Theme:
Theme Mode: