Reports in time of check time of use toctou race condition category: S.No Title Bounty 1 Ability to bypass partner email confirmation to take over any store given an employee email $15250.0 2 Time-of-check to time-of-use vulnerability in the std::fs::remove_dir_all() function of the Rust standard library $4000.0 3 [curl] CVE-2023-32001: fopen race condition $2480.0 4 Race condition in joining CTF group $500.0 5 Bypass subdomain limits using race condition $100.0 6 Race condition in claiming program credentials $0.0 7 Race Condition leads to undeletable group member $0.0 8 Bypass apiserver proxy filter $0.0 9 Race condition leads to Inflation of coins when bought via Google Play Store at endpoint https://oauth.reddit.com/api/v2/gold/android/verify_purchase $0.0 10 [api.krisp.ai] Race condition on /v2/seats endpoint allows bypassing the original seat limit $0.0 11 Promotion code can be used more than redemption limit. $0.0 12 CVE-2023-32001: fopen race condition $0.0