Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
CVE-2022-27780: percent-encoded path separator in URL host

πŸ‘‰ https://hackerone.com/reports/1553841

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 3:33pm (UTC)
πŸ‘1
CVE-2022-30115: HSTS bypass via trailing dot

πŸ‘‰ https://hackerone.com/reports/1557449

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 3:33pm (UTC)
Remote kernel heap overflow

πŸ‘‰ https://hackerone.com/reports/1350653

πŸ”Ή Severity: High | πŸ’° 10,000 USD
πŸ”Ή Reported To: PlayStation
πŸ”Ή Reported By: #m00nbsd
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 11, 2022, 6:09pm (UTC)
πŸ‘2πŸ”₯2πŸ‘2❀1
Storage of old passwords in plain text format

πŸ‘‰ https://hackerone.com/reports/1549217

πŸ”Ή Severity: Medium | πŸ’° 750 USD
πŸ”Ή Reported To: Recorded Future
πŸ”Ή Reported By: #subuganz
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 1:06pm (UTC)
SQL Injection on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/277380

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #cdl
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 7:57pm (UTC)
SQL Injection on https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ/

πŸ‘‰ https://hackerone.com/reports/232378

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #cdl
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 7:59pm (UTC)
CVE-2020-3187 - Unauthenticated Arbitrary File Deletion

πŸ‘‰ https://hackerone.com/reports/1555025

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:00pm (UTC)
CVE-2020-3187 - Unauthenticated Arbitrary File Deletion

πŸ‘‰ https://hackerone.com/reports/1555027

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:01pm (UTC)
[CVE-2020-3452] Unauthenticated file read in Cisco ASA

πŸ‘‰ https://hackerone.com/reports/1555021

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:02pm (UTC)
[CVE-2020-3452] Unauthenticated file read in Cisco ASA

πŸ‘‰ https://hackerone.com/reports/1555015

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:03pm (UTC)
CVE-2022-27782: TLS and SSH connection too eager reuse

πŸ‘‰ https://hackerone.com/reports/1565624

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:31pm (UTC)
CVE-2022-27778: curl removes wrong file on error

πŸ‘‰ https://hackerone.com/reports/1565623

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:32pm (UTC)
[Java]: CWE-321 - Query to detect hardcoded JWT secret keys

πŸ‘‰ https://hackerone.com/reports/1567588

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #not_specified
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:30am (UTC)
[CPP]: Add query for CWE-190: Integer Overflow or Wraparound when using transform after operation

πŸ‘‰ https://hackerone.com/reports/1564100

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #ihsinme
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[Java]: CWE-552 Add sources and sinks to detect unsafe getResource calls in Java EE applications

πŸ‘‰ https://hackerone.com/reports/1564099

πŸ”Ή Severity: Medium | πŸ’° 1,800 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #luchua
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[CPP]: Add query for CWE-754: Improper Check for Unusual or Exceptional Conditions when using functions scanf

πŸ‘‰ https://hackerone.com/reports/1549073

πŸ”Ή Severity: Medium | πŸ’° 1,800 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #ihsinme
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[Java] CWE-016: Query to detect insecure configuration of Spring Boot Actuator

πŸ‘‰ https://hackerone.com/reports/1137966

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #luchua
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:32am (UTC)
Cookie injection from non-secure context

πŸ‘‰ https://hackerone.com/reports/1560324

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 13, 2022, 6:44am (UTC)
Memory leak in CURLOPT_XOAUTH2_BEARER

πŸ‘‰ https://hackerone.com/reports/1567257

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #pappacoda
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: May 13, 2022, 7:51am (UTC)
error parse uri path in curl

πŸ‘‰ https://hackerone.com/reports/1566462

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #iylz
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 13, 2022, 8:34pm (UTC)
Download full backup [Mtn.co.rw]

πŸ‘‰ https://hackerone.com/reports/1516520

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #ibrahimatix0x01
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 9:54am (UTC)