Bugpoint
1.04K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
RXSS on β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1555582

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #tmz900
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 10, 2022, 2:44pm (UTC)
bd-j exploit chain

πŸ‘‰ https://hackerone.com/reports/1379975

πŸ”Ή Severity: High | πŸ’° 20,000 USD
πŸ”Ή Reported To: PlayStation
πŸ”Ή Reported By: #theflow0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 10, 2022, 8:26pm (UTC)
πŸ‘3
Email address disclosure via invite token validatiion

πŸ‘‰ https://hackerone.com/reports/1560072

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #noob_but_cut3
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 12:28am (UTC)
disclosure the live_analytics information of any livestream.

πŸ‘‰ https://hackerone.com/reports/1561299

πŸ”Ή Severity: Medium | πŸ’° 1,000 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #datph4m
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 12:33am (UTC)
CVE-2022-27779: cookie for trailing dot TLD

πŸ‘‰ https://hackerone.com/reports/1565615

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 6:58pm (UTC)
πŸ‘1
CVE-2022-27780: percent-encoded path separator in URL host

πŸ‘‰ https://hackerone.com/reports/1565619

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 6:58pm (UTC)
CVE-2022-30115: HSTS bypass via trailing dot

πŸ‘‰ https://hackerone.com/reports/1565622

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 6:58pm (UTC)
All user password hash can be seen from admin panel

πŸ‘‰ https://hackerone.com/reports/1489892

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: UPchieve
πŸ”Ή Reported By: #dark_haxor
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 11, 2022, 11:31pm (UTC)
πŸ‘1
lack of rate limit on athentification login page & forgot password page

πŸ‘‰ https://hackerone.com/reports/1591764

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Showmax
πŸ”Ή Reported By: #saidkira
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: June 13, 2022, 7:09am (UTC)
Rails::Html::SafeListSanitizer vulnerable to xss attack in an environment that allows the style tag

πŸ‘‰ https://hackerone.com/reports/1530898

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Ruby on Rails
πŸ”Ή Reported By: #windshock
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 14, 2022, 3:49am (UTC)
Reflected Cross Site Scripting at https://www.grouplogic.com/files/glidownload/verify3.asp [Uppercase Filter Bypass]

πŸ‘‰ https://hackerone.com/reports/1167034

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #ub3rsick
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 14, 2022, 10:20am (UTC)
Reflected Cross Site Scripting at ColdFusion Debugging Panel https://www.grouplogic.com/CFIDE/debug/cf_debugFr.cfm

πŸ‘‰ https://hackerone.com/reports/1166918

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #ub3rsick
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 14, 2022, 10:20am (UTC)
HTML Injection in E-mail

πŸ‘‰ https://hackerone.com/reports/1536899

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #mega7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 14, 2022, 10:21am (UTC)
Hyper Link Injection while signup

πŸ‘‰ https://hackerone.com/reports/1166073

πŸ”Ή Severity: Low
πŸ”Ή Reported To: UPchieve
πŸ”Ή Reported By: #011alsanosi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 15, 2022, 10:04am (UTC)
CPP: Add query for CWE-243 Creation of chroot Jail Without Changing Working Directory

πŸ‘‰ https://hackerone.com/reports/1582697

πŸ”Ή Severity: Low | πŸ’° 1,000 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #ihsinme
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 15, 2022, 2:57pm (UTC)
Golang : Hardcoded secret used for signing JWT

πŸ‘‰ https://hackerone.com/reports/1595009

πŸ”Ή Severity: Medium | πŸ’° 1,800 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #porcupineyhairs
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 15, 2022, 2:58pm (UTC)
Golang : Add Query To Detect PAM Authorization Bugs

πŸ‘‰ https://hackerone.com/reports/1597437

πŸ”Ή Severity: Medium | πŸ’° 1,800 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #porcupineyhairs
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 15, 2022, 2:58pm (UTC)
The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more su

πŸ‘‰ https://hackerone.com/reports/1591504

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: LinkedIn
πŸ”Ή Reported By: #suryasnn
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 15, 2022, 6:18pm (UTC)
Remote 0click exfiltration of Safari user's IP address

πŸ‘‰ https://hackerone.com/reports/1392211

πŸ”Ή Severity: Medium | πŸ’° 560 USD
πŸ”Ή Reported To: Twitter
πŸ”Ή Reported By: #max2x
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 15, 2022, 8:00pm (UTC)
Delete direct message history without access the proper conversation_id

πŸ‘‰ https://hackerone.com/reports/1487804

πŸ”Ή Severity: Medium | πŸ’° 560 USD
πŸ”Ή Reported To: Twitter
πŸ”Ή Reported By: #saiful6601
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: June 15, 2022, 8:01pm (UTC)
Rate limit Bypass on contact-us through IP Rotator (burp extension)(https://www.linkedin.com/help/linkedin/solve/contact)

πŸ‘‰ https://hackerone.com/reports/1578121

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: LinkedIn
πŸ”Ή Reported By: #sachinrajput
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: June 15, 2022, 9:10pm (UTC)