Bugpoint
1.03K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Error in Deleting Deck cards attachment reveals the full path of the website

πŸ‘‰ https://hackerone.com/reports/1354334

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #ctulhu
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 20, 2022, 2:04pm (UTC)
Arbitrary POST request as victim user from HTML injection in Jupyter notebooks

πŸ‘‰ https://hackerone.com/reports/1409788

πŸ”Ή Severity: High | πŸ’° 8,690 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 20, 2022, 2:32pm (UTC)
πŸ‘2
Clickjacking at app.lemlist.com

πŸ‘‰ https://hackerone.com/reports/1574017

πŸ”Ή Severity: High
πŸ”Ή Reported To: lemlist
πŸ”Ή Reported By: #ondermedia
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 20, 2022, 3:04pm (UTC)
πŸ‘1
Possible Domain Takeover on AWS Instance.

πŸ‘‰ https://hackerone.com/reports/1390782

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #samuelsiv
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 22, 2022, 8:18pm (UTC)
πŸ‘1
Email Verification Bypass by bruteforcing when setting up 2FA

πŸ‘‰ https://hackerone.com/reports/1394984

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: Evernote
πŸ”Ή Reported By: #cyberworlcload
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 22, 2022, 9:41pm (UTC)
[Java]: Flow sources and steps for JMS and RabbitMQ

πŸ‘‰ https://hackerone.com/reports/1579235

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #not_specified
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 23, 2022, 8:45pm (UTC)
[python]: Zip Slip Vulnerability

πŸ‘‰ https://hackerone.com/reports/1572496

πŸ”Ή Severity: Low | πŸ’° 1,000 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #farid_hunter
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 23, 2022, 8:46pm (UTC)
❀2
Stored XSS in photos_user_map.gne

πŸ‘‰ https://hackerone.com/reports/1534636

πŸ”Ή Severity: High | πŸ’° 3,263 USD
πŸ”Ή Reported To: Flickr
πŸ”Ή Reported By: #keer0k
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 23, 2022, 11:21pm (UTC)
Open redirect bypass

πŸ‘‰ https://hackerone.com/reports/1513031

πŸ”Ή Severity: Low | πŸ’° 300 USD
πŸ”Ή Reported To: Flickr
πŸ”Ή Reported By: #xlord91
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 23, 2022, 11:23pm (UTC)
Cross-site scripting on dashboard2.omise.co

πŸ‘‰ https://hackerone.com/reports/1532858

πŸ”Ή Severity: Critical | πŸ’° 200 USD
πŸ”Ή Reported To: Omise
πŸ”Ή Reported By: #oblivionlight
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 24, 2022, 11:54am (UTC)
[com.exness.android.pa Android] Universal XSS in webview. Lead to steal user cookies

πŸ‘‰ https://hackerone.com/reports/532836

πŸ”Ή Severity: No Rating | πŸ’° 400 USD
πŸ”Ή Reported To: EXNESS
πŸ”Ή Reported By: #nearsecurity
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 24, 2022, 3:24pm (UTC)
Critical broken cookie signing on dagobah.flickr.com

πŸ‘‰ https://hackerone.com/reports/1440290

πŸ”Ή Severity: Medium | πŸ’° 479 USD
πŸ”Ή Reported To: Flickr
πŸ”Ή Reported By: #ian
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 24, 2022, 11:56pm (UTC)
πŸ€”1
Email templates XSS by filterXSS bypass

πŸ‘‰ https://hackerone.com/reports/1404804

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Judge.me
πŸ”Ή Reported By: #caue
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 25, 2022, 7:45am (UTC)
Stored XSS in Notes (with CSP bypass for gitlab.com)

πŸ‘‰ https://hackerone.com/reports/1481207

πŸ”Ή Severity: High | πŸ’° 13,950 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 25, 2022, 12:09pm (UTC)
πŸ”₯2πŸ‘1
Blind XSS in app.pullrequest.com/β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ via /reviews/ratings/{uuid}

πŸ‘‰ https://hackerone.com/reports/1558010

πŸ”Ή Severity: High | πŸ’° 2,500 USD
πŸ”Ή Reported To: HackerOne
πŸ”Ή Reported By: #bugra
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 25, 2022, 4:28pm (UTC)
πŸ‘1πŸ”₯1
Read Other Users Reports Through Cloning

πŸ‘‰ https://hackerone.com/reports/1505609

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. General Services Administration
πŸ”Ή Reported By: #hollaatm3
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 26, 2022, 12:41pm (UTC)
[Urgent] Critical Vulnerability [RCE] on β–ˆβ–ˆβ–ˆ vulnerable to Remote Code Execution by exploiting MS15-034, CVE-2015-1635

πŸ‘‰ https://hackerone.com/reports/469730

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #ashutosh7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 26, 2022, 4:23pm (UTC)
Full read SSRF in flyte-poc-us-east4.uberinternal.com

πŸ‘‰ https://hackerone.com/reports/1540906

πŸ”Ή Severity: Medium | πŸ’° 2,000 USD
πŸ”Ή Reported To: Uber
πŸ”Ή Reported By: #ian
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 26, 2022, 10:18pm (UTC)
πŸ‘1
Notification implicit PendingIntent in com.nextcloud.client allows to access contacts

πŸ‘‰ https://hackerone.com/reports/1161401

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #qj_test
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 27, 2022, 7:23am (UTC)
Control character filtering misses leading and trailing whitespace in file and folder names

πŸ‘‰ https://hackerone.com/reports/1402249

πŸ”Ή Severity: Medium | πŸ’° 100 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #david_h1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 27, 2022, 7:23am (UTC)
CVE-2022-28738: Double free in Regexp compilation

πŸ‘‰ https://hackerone.com/reports/1549636

πŸ”Ή Severity: High | πŸ’° 4,000 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #piao
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 28, 2022, 6:18pm (UTC)