Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
[Java]: CWE-321 - Query to detect hardcoded JWT secret keys

πŸ‘‰ https://hackerone.com/reports/1567588

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #not_specified
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:30am (UTC)
[CPP]: Add query for CWE-190: Integer Overflow or Wraparound when using transform after operation

πŸ‘‰ https://hackerone.com/reports/1564100

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #ihsinme
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[Java]: CWE-552 Add sources and sinks to detect unsafe getResource calls in Java EE applications

πŸ‘‰ https://hackerone.com/reports/1564099

πŸ”Ή Severity: Medium | πŸ’° 1,800 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #luchua
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[CPP]: Add query for CWE-754: Improper Check for Unusual or Exceptional Conditions when using functions scanf

πŸ‘‰ https://hackerone.com/reports/1549073

πŸ”Ή Severity: Medium | πŸ’° 1,800 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #ihsinme
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:31am (UTC)
[Java] CWE-016: Query to detect insecure configuration of Spring Boot Actuator

πŸ‘‰ https://hackerone.com/reports/1137966

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #luchua
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 13, 2022, 12:32am (UTC)
Cookie injection from non-secure context

πŸ‘‰ https://hackerone.com/reports/1560324

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 13, 2022, 6:44am (UTC)
Memory leak in CURLOPT_XOAUTH2_BEARER

πŸ‘‰ https://hackerone.com/reports/1567257

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #pappacoda
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: May 13, 2022, 7:51am (UTC)
error parse uri path in curl

πŸ‘‰ https://hackerone.com/reports/1566462

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #iylz
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 13, 2022, 8:34pm (UTC)
Download full backup [Mtn.co.rw]

πŸ‘‰ https://hackerone.com/reports/1516520

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #ibrahimatix0x01
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 9:54am (UTC)
Public Postman Api Collection Leaks Internal access to https://assets-paris-dev.codefi.network/

πŸ‘‰ https://hackerone.com/reports/1523651

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Consensys
πŸ”Ή Reported By: #polem4rch
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 1:44pm (UTC)
Disclose customer orders details by shopify chat application.

πŸ‘‰ https://hackerone.com/reports/968165

πŸ”Ή Severity: Medium | πŸ’° 2,500 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #zambo
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 2:33pm (UTC)
Disclose STUFF member name and make actions.

πŸ‘‰ https://hackerone.com/reports/968174

πŸ”Ή Severity: No Rating | πŸ’° 500 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #zambo
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 14, 2022, 2:34pm (UTC)
Credential leak on redirect

πŸ‘‰ https://hackerone.com/reports/1568175

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #iylz
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: May 14, 2022, 4:06pm (UTC)
Origin IP found, WAF Cloudflare Bypass

πŸ‘‰ https://hackerone.com/reports/1536299

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: SMTP2GO BBP
πŸ”Ή Reported By: #mrrobot2050
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 15, 2022, 10:20am (UTC)
HTTP Request Smuggling in Transform Rules using hexadecimal escape sequences in the concat() function

πŸ‘‰ https://hackerone.com/reports/1478633

πŸ”Ή Severity: Critical | πŸ’° 6,000 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #albertspedersen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 8:57am (UTC)
CVE-2022-27781: CERTINFO never-ending busy-loop

πŸ‘‰ https://hackerone.com/reports/1555441

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #sybr
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 9:01am (UTC)
Security misconfiguration

πŸ‘‰ https://hackerone.com/reports/1486327

πŸ”Ή Severity: High
πŸ”Ή Reported To: lemlist
πŸ”Ή Reported By: #mr23r0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 9:41am (UTC)
Site information's Display Name section vulnerable for XSS attacks and HTML Injections.

πŸ‘‰ https://hackerone.com/reports/1554888

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #sawrav-chowdhury
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 1:59pm (UTC)
Privilege Escalation on TikTok for Business

πŸ‘‰ https://hackerone.com/reports/1505567

πŸ”Ή Severity: Medium | πŸ’° 2,500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #naaash
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 8:06pm (UTC)
πŸ‘1
[app.lemlist.com] Improper handling of payment lead to bypass payment

πŸ‘‰ https://hackerone.com/reports/1420697

πŸ”Ή Severity: High
πŸ”Ή Reported To: lemlist
πŸ”Ή Reported By: #omarelfarsaoui
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 17, 2022, 8:54am (UTC)
Integer overflow vulnerability

πŸ‘‰ https://hackerone.com/reports/1562515

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Glovo
πŸ”Ή Reported By: #0f1c3r
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 17, 2022, 1:46pm (UTC)