Bugpoint
1.02K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Local file disclosure through SSRF at next.nutanix.com

πŸ‘‰ https://hackerone.com/reports/471520

πŸ”Ή Severity: High
πŸ”Ή Reported To: Nutanix
πŸ”Ή Reported By: #tosun
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 25, 2022, 10:27pm (UTC)
RCE via exposed JMX server on jabber.37signals.com/jabber.basecamp.com

πŸ‘‰ https://hackerone.com/reports/1456063

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Basecamp
πŸ”Ή Reported By: #ian
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 26, 2022, 7:01am (UTC)
Stored XSS in "product type" field executed via product filters

πŸ‘‰ https://hackerone.com/reports/1404770

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Judge.me
πŸ”Ή Reported By: #glister
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 26, 2022, 4:11pm (UTC)
SQL Injection on https://soa-accp.glbx.tva.gov/ via "/api/" path - VI-21-015

πŸ‘‰ https://hackerone.com/reports/1125752

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Tennessee Valley Authority
πŸ”Ή Reported By: #yassinek3ch
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 26, 2022, 7:33pm (UTC)
CVE-2022-27774: Credential leak on redirect

πŸ‘‰ https://hackerone.com/reports/1543773

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 27, 2022, 9:58am (UTC)
CVE-2022-27775: Bad local IPv6 connection reuse

πŸ‘‰ https://hackerone.com/reports/1546268

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 27, 2022, 9:58am (UTC)
CVE-2022-27776: Auth/cookie leak on redirect

πŸ‘‰ https://hackerone.com/reports/1547048

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 27, 2022, 9:58am (UTC)
Container escape on public GitLab CI runners

πŸ‘‰ https://hackerone.com/reports/1442118

πŸ”Ή Severity: High
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #ec0
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: April 27, 2022, 11:12am (UTC)
subdomain takeover (abandoned Zendesk β–ˆ.easycontactnow.com)

πŸ‘‰ https://hackerone.com/reports/1486670

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #bx_1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 28, 2022, 5:59am (UTC)
CVE-2022-27774: Credential leak on redirect

πŸ‘‰ https://hackerone.com/reports/1551586

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 6:32am (UTC)
CVE-2022-27775: Bad local IPv6 connection reuse

πŸ‘‰ https://hackerone.com/reports/1551588

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 6:32am (UTC)
CVE-2022-27776: Auth/cookie leak on redirect

πŸ‘‰ https://hackerone.com/reports/1551591

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 6:32am (UTC)
DoS via large console messages

πŸ‘‰ https://hackerone.com/reports/1243724

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: Mattermost
πŸ”Ή Reported By: #thesecuritydev
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 7:11am (UTC)
CVE-2022-22576: OAUTH2 bearer bypass in connection re-use

πŸ‘‰ https://hackerone.com/reports/1526328

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #monnerat
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 11:27am (UTC)
OAUTH2 bearer not-checked for connection re-use

πŸ‘‰ https://hackerone.com/reports/1552110

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #monnerat
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 11:34am (UTC)
Possibility to force an admin to install recommended applications

πŸ‘‰ https://hackerone.com/reports/1403614

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #igorpyan
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 11:50am (UTC)
😁1
SQL INJECTION in https://β–ˆβ–ˆβ–ˆβ–ˆ/β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/723044

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #mido0x0x
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 1:56pm (UTC)
Blind SQL Injection

πŸ‘‰ https://hackerone.com/reports/771215

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #mido0x0x
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 1:57pm (UTC)
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ vulnerable to CVE-2022-22954

πŸ‘‰ https://hackerone.com/reports/1537543

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #null_bytes
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 1:58pm (UTC)
SSRF due to CVE-2021-27905 in www.β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1183472

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #fdeleite
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 2:00pm (UTC)
Sensitive data exposure via /secure/QueryComponent!Default.jspa endpoint on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1278977

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #njmulsqb
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 2:03pm (UTC)