Bugpoint
1.03K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
CVE-2022-27775: Bad local IPv6 connection reuse

πŸ‘‰ https://hackerone.com/reports/1551588

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 6:32am (UTC)
CVE-2022-27776: Auth/cookie leak on redirect

πŸ‘‰ https://hackerone.com/reports/1551591

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 6:32am (UTC)
DoS via large console messages

πŸ‘‰ https://hackerone.com/reports/1243724

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: Mattermost
πŸ”Ή Reported By: #thesecuritydev
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 7:11am (UTC)
CVE-2022-22576: OAUTH2 bearer bypass in connection re-use

πŸ‘‰ https://hackerone.com/reports/1526328

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #monnerat
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 11:27am (UTC)
OAUTH2 bearer not-checked for connection re-use

πŸ‘‰ https://hackerone.com/reports/1552110

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #monnerat
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 11:34am (UTC)
Possibility to force an admin to install recommended applications

πŸ‘‰ https://hackerone.com/reports/1403614

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #igorpyan
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 11:50am (UTC)
😁1
SQL INJECTION in https://β–ˆβ–ˆβ–ˆβ–ˆ/β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/723044

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #mido0x0x
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 1:56pm (UTC)
Blind SQL Injection

πŸ‘‰ https://hackerone.com/reports/771215

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #mido0x0x
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 1:57pm (UTC)
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ vulnerable to CVE-2022-22954

πŸ‘‰ https://hackerone.com/reports/1537543

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #null_bytes
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 1:58pm (UTC)
SSRF due to CVE-2021-27905 in www.β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1183472

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #fdeleite
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 2:00pm (UTC)
Sensitive data exposure via /secure/QueryComponent!Default.jspa endpoint on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1278977

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #njmulsqb
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 2:03pm (UTC)
lfi in filePathDownload parameter via β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1542734

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #exploitmsf
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 2:04pm (UTC)
Reflected XSS [β–ˆβ–ˆβ–ˆ]

πŸ‘‰ https://hackerone.com/reports/1309237

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #fdeleite
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 2:05pm (UTC)
Reflected XSS [β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ]

πŸ‘‰ https://hackerone.com/reports/1309385

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #fdeleite
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 2:06pm (UTC)
Hardcoded AWS credentials in β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ.msi

πŸ‘‰ https://hackerone.com/reports/1368690

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #chip_sec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 5:01pm (UTC)
Reflected XSS due to vulnerable version of sockjs

πŸ‘‰ https://hackerone.com/reports/1100326

πŸ”Ή Severity: Medium | πŸ’° 250 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #chip_sec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 5:38pm (UTC)
com.nextcloud.client bypass the protection lock in andoid app v 3.18.1 latest version.

πŸ‘‰ https://hackerone.com/reports/1450368

πŸ”Ή Severity: Low | πŸ’° 200 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #dashingjaved
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 30, 2022, 11:56am (UTC)
Enumerate class codes via yahoo dork - Can access any course under teacher - Sensitive information leaked

πŸ‘‰ https://hackerone.com/reports/1514356

πŸ”Ή Severity: High
πŸ”Ή Reported To: Khan Academy
πŸ”Ή Reported By: #bughunterpol
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 1, 2022, 6:05pm (UTC)
XSS at videostore.mtnonline.com/GL/*.aspx via all parameters

πŸ‘‰ https://hackerone.com/reports/1244731

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #homosec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 1, 2022, 9:20pm (UTC)
XSS at https://nextapps.mtnonline.com/search/suggest/q/{xss payload}

πŸ‘‰ https://hackerone.com/reports/1244722

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #homosec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 1, 2022, 9:20pm (UTC)
Self-DoS due to template injection via email field in password reset form on access.acronis.com

πŸ‘‰ https://hackerone.com/reports/1265344

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #sudo_bash
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: May 3, 2022, 6:41am (UTC)