Bugpoint
1.03K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Hardcoded AWS credentials in β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ.msi

πŸ‘‰ https://hackerone.com/reports/1368690

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #chip_sec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 5:01pm (UTC)
Reflected XSS due to vulnerable version of sockjs

πŸ‘‰ https://hackerone.com/reports/1100326

πŸ”Ή Severity: Medium | πŸ’° 250 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #chip_sec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 29, 2022, 5:38pm (UTC)
com.nextcloud.client bypass the protection lock in andoid app v 3.18.1 latest version.

πŸ‘‰ https://hackerone.com/reports/1450368

πŸ”Ή Severity: Low | πŸ’° 200 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #dashingjaved
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: April 30, 2022, 11:56am (UTC)
Enumerate class codes via yahoo dork - Can access any course under teacher - Sensitive information leaked

πŸ‘‰ https://hackerone.com/reports/1514356

πŸ”Ή Severity: High
πŸ”Ή Reported To: Khan Academy
πŸ”Ή Reported By: #bughunterpol
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 1, 2022, 6:05pm (UTC)
XSS at videostore.mtnonline.com/GL/*.aspx via all parameters

πŸ‘‰ https://hackerone.com/reports/1244731

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #homosec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 1, 2022, 9:20pm (UTC)
XSS at https://nextapps.mtnonline.com/search/suggest/q/{xss payload}

πŸ‘‰ https://hackerone.com/reports/1244722

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #homosec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 1, 2022, 9:20pm (UTC)
Self-DoS due to template injection via email field in password reset form on access.acronis.com

πŸ‘‰ https://hackerone.com/reports/1265344

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #sudo_bash
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: May 3, 2022, 6:41am (UTC)
Blind XSS via Feedback form.

πŸ‘‰ https://hackerone.com/reports/1339034

πŸ”Ή Severity: High | πŸ’° 1,250 USD
πŸ”Ή Reported To: Judge.me
πŸ”Ή Reported By: #b3hlull
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 3, 2022, 9:36am (UTC)
URL Scheme misconfiguration on TikTok for IOS

πŸ‘‰ https://hackerone.com/reports/1437294

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #glassplant
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 4, 2022, 10:17pm (UTC)
One Click Account Hijacking via Unvalidated Deeplink

πŸ‘‰ https://hackerone.com/reports/1500614

πŸ”Ή Severity: High | πŸ’° 10,000 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #fr4via
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 4, 2022, 10:23pm (UTC)
πŸ‘4
Clickjacking Vulnerability Can Leads To Delete Developer APP

πŸ‘‰ https://hackerone.com/reports/1416612

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #rioncool22
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 4, 2022, 10:25pm (UTC)
Github Account Takeover which is used as gradle vcs in "github.com/palantir/gradle-launch-config-plugin"

πŸ‘‰ https://hackerone.com/reports/1525578

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Palantir Public
πŸ”Ή Reported By: #codermak
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 5, 2022, 1:54pm (UTC)
Able to bypass email verification and change email to any other user email

πŸ‘‰ https://hackerone.com/reports/1551176

πŸ”Ή Severity: High | πŸ’° 5,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #bisesh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 6, 2022, 4:50pm (UTC)
πŸ‘3πŸ‘2
SQL injection in URL path processing on www.ibm.com

πŸ‘‰ https://hackerone.com/reports/1527284

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: IBM
πŸ”Ή Reported By: #asterite
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 6, 2022, 6:37pm (UTC)
πŸ”₯1
Multiple IDORs in family pairing api

πŸ‘‰ https://hackerone.com/reports/1286332

πŸ”Ή Severity: High | πŸ’° 7,500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #s3c
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 6, 2022, 9:18pm (UTC)
πŸ”₯2πŸ‘1
Reflected xss in https://sh.reddit.com

πŸ‘‰ https://hackerone.com/reports/1549206

πŸ”Ή Severity: High | πŸ’° 5,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #abhiramsita
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 8, 2022, 7:36am (UTC)
πŸ”₯5πŸ‘2
Slowvote and Countdown can cause Denial of Service due to recursive inclusion

πŸ‘‰ https://hackerone.com/reports/1563142

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: Phabricator
πŸ”Ή Reported By: #dyls
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 9, 2022, 6:37pm (UTC)
Global default settings page is accessible to non-administrators

πŸ‘‰ https://hackerone.com/reports/1563139

πŸ”Ή Severity: No Rating | πŸ’° 300 USD
πŸ”Ή Reported To: Phabricator
πŸ”Ή Reported By: #dyls
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 9, 2022, 10:25pm (UTC)
Misconfigured Rate Limit in Sending Notifications to the Victims Phone Via the Endpoint " /faxes/inbox "

πŸ‘‰ https://hackerone.com/reports/1482919

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Alohi
πŸ”Ή Reported By: #shamim_12__
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 10, 2022, 9:14am (UTC)
πŸ‘1
Certificate authentication re-use on redirect

πŸ‘‰ https://hackerone.com/reports/1563061

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 11, 2022, 6:48am (UTC)
CVE-2022-27778: curl removes wrong file on error

πŸ‘‰ https://hackerone.com/reports/1553598

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 7:23am (UTC)