Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
"External status checks" can be accepted by users below developer access if the user is either author or assignee of the target merge request

πŸ‘‰ https://hackerone.com/reports/1375393

πŸ”Ή Severity: Medium | πŸ’° 610 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 2:04pm (UTC)
Gitlab Pages token theft using service workers

πŸ‘‰ https://hackerone.com/reports/1439552

πŸ”Ή Severity: Medium | πŸ’° 1,680 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #ehhthing
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 2:06pm (UTC)
XSS by clicking Jira's link

πŸ‘‰ https://hackerone.com/reports/1194254

πŸ”Ή Severity: Medium | πŸ’° 1,130 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #ooooooo_q
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 8, 2022, 2:07pm (UTC)
Several Subdomains Takeover

πŸ‘‰ https://hackerone.com/reports/1591085

πŸ”Ή Severity: High
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #3amii
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 8, 2022, 8:36pm (UTC)
match

πŸ‘‰ https://hackerone.com/reports/1555440

πŸ”Ή Severity: High
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #maslahhunter
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 9, 2022, 7:09am (UTC)
Integer overflows in unescape_word()

πŸ‘‰ https://hackerone.com/reports/1564922

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #ddme
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 9, 2022, 7:10am (UTC)
Moderator can enable cam/mic remotely if cam/mic-permission was disabled while user has activated cam/mic

πŸ‘‰ https://hackerone.com/reports/1520685

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #michag86
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 9, 2022, 12:42pm (UTC)
RXSS on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1555582

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #tmz900
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 10, 2022, 2:44pm (UTC)
bd-j exploit chain

πŸ‘‰ https://hackerone.com/reports/1379975

πŸ”Ή Severity: High | πŸ’° 20,000 USD
πŸ”Ή Reported To: PlayStation
πŸ”Ή Reported By: #theflow0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 10, 2022, 8:26pm (UTC)
πŸ‘3
Email address disclosure via invite token validatiion

πŸ‘‰ https://hackerone.com/reports/1560072

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #noob_but_cut3
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 12:28am (UTC)
disclosure the live_analytics information of any livestream.

πŸ‘‰ https://hackerone.com/reports/1561299

πŸ”Ή Severity: Medium | πŸ’° 1,000 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #datph4m
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 12:33am (UTC)
CVE-2022-27779: cookie for trailing dot TLD

πŸ‘‰ https://hackerone.com/reports/1565615

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 6:58pm (UTC)
πŸ‘1
CVE-2022-27780: percent-encoded path separator in URL host

πŸ‘‰ https://hackerone.com/reports/1565619

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 6:58pm (UTC)
CVE-2022-30115: HSTS bypass via trailing dot

πŸ‘‰ https://hackerone.com/reports/1565622

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 6:58pm (UTC)
All user password hash can be seen from admin panel

πŸ‘‰ https://hackerone.com/reports/1489892

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: UPchieve
πŸ”Ή Reported By: #dark_haxor
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 11:31pm (UTC)
πŸ‘1
lack of rate limit on athentification login page & forgot password page

πŸ‘‰ https://hackerone.com/reports/1591764

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Showmax
πŸ”Ή Reported By: #saidkira
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: June 13, 2022, 7:09am (UTC)
Rails::Html::SafeListSanitizer vulnerable to xss attack in an environment that allows the style tag

πŸ‘‰ https://hackerone.com/reports/1530898

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Ruby on Rails
πŸ”Ή Reported By: #windshock
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 14, 2022, 3:49am (UTC)
Reflected Cross Site Scripting at https://www.grouplogic.com/files/glidownload/verify3.asp [Uppercase Filter Bypass]

πŸ‘‰ https://hackerone.com/reports/1167034

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #ub3rsick
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 14, 2022, 10:20am (UTC)
Reflected Cross Site Scripting at ColdFusion Debugging Panel https://www.grouplogic.com/CFIDE/debug/cf_debugFr.cfm

πŸ‘‰ https://hackerone.com/reports/1166918

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #ub3rsick
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 14, 2022, 10:20am (UTC)
HTML Injection in E-mail

πŸ‘‰ https://hackerone.com/reports/1536899

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #mega7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 14, 2022, 10:21am (UTC)
Hyper Link Injection while signup

πŸ‘‰ https://hackerone.com/reports/1166073

πŸ”Ή Severity: Low
πŸ”Ή Reported To: UPchieve
πŸ”Ή Reported By: #011alsanosi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 15, 2022, 10:04am (UTC)