Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Users who are restricted to use the application because of a "Waiting List" are able to get access to the Beta Application by bypassing the waitlist

πŸ‘‰ https://hackerone.com/reports/1494308

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Alohi
πŸ”Ή Reported By: #darkknight4688
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 30, 2022, 9:21am (UTC)
Self XSS in attachments name

πŸ‘‰ https://hackerone.com/reports/1536901

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #mega7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 31, 2022, 9:10am (UTC)
πŸ€”1
BlIND XSS on https://open.vanillaforums.com

πŸ‘‰ https://hackerone.com/reports/1189885

πŸ”Ή Severity: High | πŸ’° 300 USD
πŸ”Ή Reported To: Vanilla
πŸ”Ή Reported By: #mohit0786
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 31, 2022, 10:15am (UTC)
Improper input-size validation on the user new session name can result in server-side DDoS.

πŸ‘‰ https://hackerone.com/reports/1153138

πŸ”Ή Severity: Medium | πŸ’° 100 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #demonia
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 31, 2022, 2:37pm (UTC)
CSRF token validation system is disabled on Stripe Dashboard

πŸ‘‰ https://hackerone.com/reports/1493437

πŸ”Ή Severity: Medium | πŸ’° 2,500 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #rodolfomarianocy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 31, 2022, 5:05pm (UTC)
DOM XSS on www.adobe.com

πŸ‘‰ https://hackerone.com/reports/1260825

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #saajanbhujel
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 31, 2022, 5:14pm (UTC)
Able to bypass the fix on DOM XSS at [www.adobe.com]

πŸ‘‰ https://hackerone.com/reports/1398374

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #saajanbhujel
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 31, 2022, 5:16pm (UTC)
Deprecated owners.query API bypasses object view policy

πŸ‘‰ https://hackerone.com/reports/1584409

πŸ”Ή Severity: No Rating | πŸ’° 300 USD
πŸ”Ή Reported To: Phabricator
πŸ”Ή Reported By: #dyls
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 31, 2022, 7:14pm (UTC)
Django debug enabled showing information about system, database, configuration files

πŸ‘‰ https://hackerone.com/reports/1561377

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Glovo
πŸ”Ή Reported By: #omarelfarsaoui
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 31, 2022, 9:28pm (UTC)
user can bypass password enforcement when federated sharing is enabled

πŸ‘‰ https://hackerone.com/reports/838510

πŸ”Ή Severity: No Rating | πŸ’° 250 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #michag86
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 1, 2022, 1:52pm (UTC)
Exfiltrate GDrive access token using CSRF

πŸ‘‰ https://hackerone.com/reports/1468010

πŸ”Ή Severity: Medium | πŸ’° 1,728 USD
πŸ”Ή Reported To: Dropbox
πŸ”Ή Reported By: #staz0t
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 1, 2022, 9:04pm (UTC)
πŸ”₯1
AWS Load Balancer Controller can be used by an attacker to modify rules of any Security Group that they are able to tag

πŸ‘‰ https://hackerone.com/reports/1238482

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Kubernetes
πŸ”Ή Reported By: #t0rr3sp3dr0
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 2, 2022, 12:49am (UTC)
AWS Load Balancer Controller Managed Security Groups can be replaced by an unprivileged attacker

πŸ‘‰ https://hackerone.com/reports/1238017

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Kubernetes
πŸ”Ή Reported By: #t0rr3sp3dr0
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 2, 2022, 12:49am (UTC)
8ybhy85kld9zp9xf84x6.imgur.com Subdomain Takeover

πŸ‘‰ https://hackerone.com/reports/1527405

πŸ”Ή Severity: High | πŸ’° 50 USD
πŸ”Ή Reported To: Imgur
πŸ”Ή Reported By: #mr_baka
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 3, 2022, 5:45pm (UTC)
Github Account Takeover from Docs page of `kubernetes-csi.github.io`

πŸ‘‰ https://hackerone.com/reports/1434967

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Kubernetes
πŸ”Ή Reported By: #codermak
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 4, 2022, 5:58pm (UTC)
KRB-FTP: Security level downgrade

πŸ‘‰ https://hackerone.com/reports/1590102

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 5, 2022, 8:58pm (UTC)
Heap overflow via HTTP/2 PUSH_PROMISE

πŸ‘‰ https://hackerone.com/reports/1589847

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #nyymi
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 5, 2022, 8:59pm (UTC)
Registered users contact information disclosure on salesforce lightning endpoint https://disposal.gsa.gov

πŸ‘‰ https://hackerone.com/reports/1443654

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. General Services Administration
πŸ”Ή Reported By: #rptl
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 6, 2022, 6:17am (UTC)
2 Cache Poisoning Attack Methods Affect Core Functionality www.exodus.com

πŸ‘‰ https://hackerone.com/reports/1581454

πŸ”Ή Severity: High
πŸ”Ή Reported To: Exodus
πŸ”Ή Reported By: #bismillahfortuner
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: June 6, 2022, 11:31am (UTC)
Misconfigurated login page able to lock login action for any account without user interaction

πŸ‘‰ https://hackerone.com/reports/1582778

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #h1ugroon
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: June 6, 2022, 11:10pm (UTC)
Stored Cross Site Scripting at https://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode

πŸ‘‰ https://hackerone.com/reports/1164853

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #ub3rsick
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 7, 2022, 9:25am (UTC)