Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Reflected xss in https://sh.reddit.com

πŸ‘‰ https://hackerone.com/reports/1549206

πŸ”Ή Severity: High | πŸ’° 5,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #abhiramsita
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 8, 2022, 7:36am (UTC)
πŸ”₯5πŸ‘2
Slowvote and Countdown can cause Denial of Service due to recursive inclusion

πŸ‘‰ https://hackerone.com/reports/1563142

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: Phabricator
πŸ”Ή Reported By: #dyls
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 9, 2022, 6:37pm (UTC)
Global default settings page is accessible to non-administrators

πŸ‘‰ https://hackerone.com/reports/1563139

πŸ”Ή Severity: No Rating | πŸ’° 300 USD
πŸ”Ή Reported To: Phabricator
πŸ”Ή Reported By: #dyls
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 9, 2022, 10:25pm (UTC)
Misconfigured Rate Limit in Sending Notifications to the Victims Phone Via the Endpoint " /faxes/inbox "

πŸ‘‰ https://hackerone.com/reports/1482919

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Alohi
πŸ”Ή Reported By: #shamim_12__
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 10, 2022, 9:14am (UTC)
πŸ‘1
Certificate authentication re-use on redirect

πŸ‘‰ https://hackerone.com/reports/1563061

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 11, 2022, 6:48am (UTC)
CVE-2022-27778: curl removes wrong file on error

πŸ‘‰ https://hackerone.com/reports/1553598

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 7:23am (UTC)
CVE-2022-27779: cookie for trailing dot TLD

πŸ‘‰ https://hackerone.com/reports/1553301

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 7:59am (UTC)
Account takeover via Google OneTap

πŸ‘‰ https://hackerone.com/reports/671406

πŸ”Ή Severity: High | πŸ’° 1,500 USD
πŸ”Ή Reported To: Priceline
πŸ”Ή Reported By: #badca7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 9:37am (UTC)
CVE-2022-27782: TLS and SSH connection too eager reuse

πŸ‘‰ https://hackerone.com/reports/1555796

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 12:40pm (UTC)
SQL injextion via vulnerable doctrine/dbal version

πŸ‘‰ https://hackerone.com/reports/1390331

πŸ”Ή Severity: High
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #nickvergessen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 2:08pm (UTC)
CVE-2022-27780: percent-encoded path separator in URL host

πŸ‘‰ https://hackerone.com/reports/1553841

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 3:33pm (UTC)
πŸ‘1
CVE-2022-30115: HSTS bypass via trailing dot

πŸ‘‰ https://hackerone.com/reports/1557449

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 3:33pm (UTC)
Remote kernel heap overflow

πŸ‘‰ https://hackerone.com/reports/1350653

πŸ”Ή Severity: High | πŸ’° 10,000 USD
πŸ”Ή Reported To: PlayStation
πŸ”Ή Reported By: #m00nbsd
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 6:09pm (UTC)
πŸ‘2πŸ”₯2πŸ‘2❀1
Storage of old passwords in plain text format

πŸ‘‰ https://hackerone.com/reports/1549217

πŸ”Ή Severity: Medium | πŸ’° 750 USD
πŸ”Ή Reported To: Recorded Future
πŸ”Ή Reported By: #subuganz
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 1:06pm (UTC)
SQL Injection on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/277380

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #cdl
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 7:57pm (UTC)
SQL Injection on https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ/

πŸ‘‰ https://hackerone.com/reports/232378

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #cdl
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 7:59pm (UTC)
CVE-2020-3187 - Unauthenticated Arbitrary File Deletion

πŸ‘‰ https://hackerone.com/reports/1555025

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:00pm (UTC)
CVE-2020-3187 - Unauthenticated Arbitrary File Deletion

πŸ‘‰ https://hackerone.com/reports/1555027

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:01pm (UTC)
[CVE-2020-3452] Unauthenticated file read in Cisco ASA

πŸ‘‰ https://hackerone.com/reports/1555021

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:02pm (UTC)
[CVE-2020-3452] Unauthenticated file read in Cisco ASA

πŸ‘‰ https://hackerone.com/reports/1555015

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:03pm (UTC)
CVE-2022-27782: TLS and SSH connection too eager reuse

πŸ‘‰ https://hackerone.com/reports/1565624

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:31pm (UTC)