Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
2 Cache Poisoning Attack Methods Affect Core Functionality www.exodus.com

πŸ‘‰ https://hackerone.com/reports/1581454

πŸ”Ή Severity: High
πŸ”Ή Reported To: Exodus
πŸ”Ή Reported By: #bismillahfortuner
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: June 6, 2022, 11:31am (UTC)
Misconfigurated login page able to lock login action for any account without user interaction

πŸ‘‰ https://hackerone.com/reports/1582778

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #h1ugroon
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: June 6, 2022, 11:10pm (UTC)
Stored Cross Site Scripting at https://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode

πŸ‘‰ https://hackerone.com/reports/1164853

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #ub3rsick
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 7, 2022, 9:25am (UTC)
Store Admin Page Accessible Without Authentication at https://www.grouplogic.com/ADMIN/store/index.cfm

πŸ‘‰ https://hackerone.com/reports/1164854

πŸ”Ή Severity: Medium | πŸ’° 250 USD
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #ub3rsick
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 7, 2022, 10:20am (UTC)
Path traversal in Nuget Package Registry

πŸ‘‰ https://hackerone.com/reports/822262

πŸ”Ή Severity: High | πŸ’° 12,000 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #saltyyolk
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 7, 2022, 2:16pm (UTC)
πŸ”₯3
Private objects exposed through project import

πŸ‘‰ https://hackerone.com/reports/767770

πŸ”Ή Severity: Critical | πŸ’° 20,000 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #saltyyolk
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 7, 2022, 2:16pm (UTC)
πŸ”₯4
Steal private objects of other projects via project import

πŸ‘‰ https://hackerone.com/reports/743953

πŸ”Ή Severity: Critical | πŸ’° 20,000 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #saltyyolk
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 7, 2022, 2:16pm (UTC)
πŸ”₯4
Path traversal, to RCE

πŸ‘‰ https://hackerone.com/reports/733072

πŸ”Ή Severity: High | πŸ’° 12,000 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #saltyyolk
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 7, 2022, 2:16pm (UTC)
πŸ”₯5
Open redirect on https://www.glassdoor.com/profile/siwa.htm via state parameter

πŸ‘‰ https://hackerone.com/reports/1097208

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Glassdoor
πŸ”Ή Reported By: #0x7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 11:44am (UTC)
Reflected XSS on https://help.glassdoor.com/gd_requestsubmitpage

πŸ‘‰ https://hackerone.com/reports/1094224

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Glassdoor
πŸ”Ή Reported By: #0x7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 11:46am (UTC)
Reflected XSS on https://www.glassdoor.com/parts/header.htm

πŸ‘‰ https://hackerone.com/reports/1073712

πŸ”Ή Severity: Medium | πŸ’° 600 USD
πŸ”Ή Reported To: Glassdoor
πŸ”Ή Reported By: #0x7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 12:00pm (UTC)
Stored XSS on issue comments and other pages which contain notes

πŸ‘‰ https://hackerone.com/reports/1398305

πŸ”Ή Severity: High | πŸ’° 3,000 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #jarij
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 2:02pm (UTC)
"External status checks" can be accepted by users below developer access if the user is either author or assignee of the target merge request

πŸ‘‰ https://hackerone.com/reports/1375393

πŸ”Ή Severity: Medium | πŸ’° 610 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 2:04pm (UTC)
Gitlab Pages token theft using service workers

πŸ‘‰ https://hackerone.com/reports/1439552

πŸ”Ή Severity: Medium | πŸ’° 1,680 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #ehhthing
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 2:06pm (UTC)
XSS by clicking Jira's link

πŸ‘‰ https://hackerone.com/reports/1194254

πŸ”Ή Severity: Medium | πŸ’° 1,130 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #ooooooo_q
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 2:07pm (UTC)
Several Subdomains Takeover

πŸ‘‰ https://hackerone.com/reports/1591085

πŸ”Ή Severity: High
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #3amii
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 8, 2022, 8:36pm (UTC)
match

πŸ‘‰ https://hackerone.com/reports/1555440

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #maslahhunter
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 9, 2022, 7:09am (UTC)
Integer overflows in unescape_word()

πŸ‘‰ https://hackerone.com/reports/1564922

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #ddme
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 9, 2022, 7:10am (UTC)
Moderator can enable cam/mic remotely if cam/mic-permission was disabled while user has activated cam/mic

πŸ‘‰ https://hackerone.com/reports/1520685

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #michag86
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 9, 2022, 12:42pm (UTC)
RXSS on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1555582

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #tmz900
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 10, 2022, 2:44pm (UTC)
bd-j exploit chain

πŸ‘‰ https://hackerone.com/reports/1379975

πŸ”Ή Severity: High | πŸ’° 20,000 USD
πŸ”Ή Reported To: PlayStation
πŸ”Ή Reported By: #theflow0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 10, 2022, 8:26pm (UTC)
πŸ‘3