Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
[CVE-2020-3452] Unauthenticated file read in Cisco ASA

πŸ‘‰ https://hackerone.com/reports/1555015

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ghostxsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:03pm (UTC)
CVE-2022-27782: TLS and SSH connection too eager reuse

πŸ‘‰ https://hackerone.com/reports/1565624

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:31pm (UTC)
CVE-2022-27778: curl removes wrong file on error

πŸ‘‰ https://hackerone.com/reports/1565623

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 12, 2022, 8:32pm (UTC)
[Java]: CWE-321 - Query to detect hardcoded JWT secret keys

πŸ‘‰ https://hackerone.com/reports/1567588

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #not_specified
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:30am (UTC)
[CPP]: Add query for CWE-190: Integer Overflow or Wraparound when using transform after operation

πŸ‘‰ https://hackerone.com/reports/1564100

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #ihsinme
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[Java]: CWE-552 Add sources and sinks to detect unsafe getResource calls in Java EE applications

πŸ‘‰ https://hackerone.com/reports/1564099

πŸ”Ή Severity: Medium | πŸ’° 1,800 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #luchua
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[CPP]: Add query for CWE-754: Improper Check for Unusual or Exceptional Conditions when using functions scanf

πŸ‘‰ https://hackerone.com/reports/1549073

πŸ”Ή Severity: Medium | πŸ’° 1,800 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #ihsinme
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[Java] CWE-016: Query to detect insecure configuration of Spring Boot Actuator

πŸ‘‰ https://hackerone.com/reports/1137966

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #luchua
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:32am (UTC)
Cookie injection from non-secure context

πŸ‘‰ https://hackerone.com/reports/1560324

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 13, 2022, 6:44am (UTC)
Memory leak in CURLOPT_XOAUTH2_BEARER

πŸ‘‰ https://hackerone.com/reports/1567257

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #pappacoda
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: May 13, 2022, 7:51am (UTC)
error parse uri path in curl

πŸ‘‰ https://hackerone.com/reports/1566462

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #iylz
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 13, 2022, 8:34pm (UTC)
Download full backup [Mtn.co.rw]

πŸ‘‰ https://hackerone.com/reports/1516520

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #ibrahimatix0x01
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 9:54am (UTC)
Public Postman Api Collection Leaks Internal access to https://assets-paris-dev.codefi.network/

πŸ‘‰ https://hackerone.com/reports/1523651

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Consensys
πŸ”Ή Reported By: #polem4rch
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 1:44pm (UTC)
Disclose customer orders details by shopify chat application.

πŸ‘‰ https://hackerone.com/reports/968165

πŸ”Ή Severity: Medium | πŸ’° 2,500 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #zambo
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 2:33pm (UTC)
Disclose STUFF member name and make actions.

πŸ‘‰ https://hackerone.com/reports/968174

πŸ”Ή Severity: No Rating | πŸ’° 500 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #zambo
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 2:34pm (UTC)
Credential leak on redirect

πŸ‘‰ https://hackerone.com/reports/1568175

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #iylz
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 14, 2022, 4:06pm (UTC)
Origin IP found, WAF Cloudflare Bypass

πŸ‘‰ https://hackerone.com/reports/1536299

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: SMTP2GO BBP
πŸ”Ή Reported By: #mrrobot2050
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 15, 2022, 10:20am (UTC)
HTTP Request Smuggling in Transform Rules using hexadecimal escape sequences in the concat() function

πŸ‘‰ https://hackerone.com/reports/1478633

πŸ”Ή Severity: Critical | πŸ’° 6,000 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #albertspedersen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 8:57am (UTC)
CVE-2022-27781: CERTINFO never-ending busy-loop

πŸ‘‰ https://hackerone.com/reports/1555441

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #sybr
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 9:01am (UTC)
Security misconfiguration

πŸ‘‰ https://hackerone.com/reports/1486327

πŸ”Ή Severity: High
πŸ”Ή Reported To: lemlist
πŸ”Ή Reported By: #mr23r0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 9:41am (UTC)
Site information's Display Name section vulnerable for XSS attacks and HTML Injections.

πŸ‘‰ https://hackerone.com/reports/1554888

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #sawrav-chowdhury
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 1:59pm (UTC)