Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Blind User-Agent SQL Injection to Blind Remote OS Command Execution at β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1339430

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Sony
πŸ”Ή Reported By: #echidonut
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 6, 2022, 5:44pm (UTC)
Ownership check missing when updating or deleting attachments

πŸ‘‰ https://hackerone.com/reports/1579820

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #kesselb
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 6, 2022, 5:50pm (UTC)
Privilege escalation possible in dovecot when similar passdbs are used

πŸ‘‰ https://hackerone.com/reports/1561579

πŸ”Ή Severity: Medium | πŸ’° 900 USD
πŸ”Ή Reported To: Open-Xchange
πŸ”Ή Reported By: #julezman
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 6, 2022, 10:41pm (UTC)
Stack Buffer Overflow via `gmp_sprintf`in `BLSSignature` and `BLSSigShare`

πŸ‘‰ https://hackerone.com/reports/1546935

πŸ”Ή Severity: Medium | πŸ’° 2,500 USD
πŸ”Ή Reported To: SKALE Network
πŸ”Ή Reported By: #voiddy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 7, 2022, 12:17am (UTC)
Remote denial of service in HyperLedger Fabric

πŸ‘‰ https://hackerone.com/reports/1604951

πŸ”Ή Severity: High | πŸ’° 1,500 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #fatal0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 7, 2022, 11:55am (UTC)
Brute force of a current password on a disable 2fa leads to guess password and disable 2fa.

πŸ‘‰ https://hackerone.com/reports/1465277

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: Omise
πŸ”Ή Reported By: #sachinrajput
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 7, 2022, 4:35pm (UTC)
HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding

πŸ‘‰ https://hackerone.com/reports/1501679

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #zeyu2001
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 7, 2022, 5:26pm (UTC)
HTTP Request Smuggling Due To Improper Delimiting of Header Fields

πŸ‘‰ https://hackerone.com/reports/1524692

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #zeyu2001
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 7, 2022, 5:26pm (UTC)
HTTP Request Smuggling Due to Flawed Parsing of Transfer-Encoding

πŸ‘‰ https://hackerone.com/reports/1524555

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #zeyu2001
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 7, 2022, 5:28pm (UTC)
Clickjacking Vulnerability In Whole Page Ads Tiktok

πŸ‘‰ https://hackerone.com/reports/1418857

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #rioncool22
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 7, 2022, 11:18pm (UTC)
Exposed valid AWS, Mysql, Sendgrid and other secrets

πŸ‘‰ https://hackerone.com/reports/1580567

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Glovo
πŸ”Ή Reported By: #mehdisadir
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 8, 2022, 3:48pm (UTC)
Open Redirect through POST Request in www.redditinc.com

πŸ‘‰ https://hackerone.com/reports/1310230

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #kratul
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: July 8, 2022, 7:02pm (UTC)
Unauthorized packages modification or secrets exfiltration via GitHub actions

πŸ‘‰ https://hackerone.com/reports/1548870

πŸ”Ή Severity: High | πŸ’° 1,500 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #dusty_wormwood
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 8, 2022, 7:51pm (UTC)
πŸ‘1
Read beyond bounds in ap_strcmp_match() [zhbug_httpd_47.7]

πŸ‘‰ https://hackerone.com/reports/1595281

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 1:39pm (UTC)
Controllable read beyond bounds in lua_websocket_readbytes() [zhbug_httpd_126]

πŸ‘‰ https://hackerone.com/reports/1595290

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 1:45pm (UTC)
πŸ‘1
Read beyond bounds in mod_isapi.c [zhbug_httpd_41]

πŸ‘‰ https://hackerone.com/reports/1595296

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 1:50pm (UTC)
Read beyond bounds via ap_rwrite() [zhbug_httpd_47.2]

πŸ‘‰ https://hackerone.com/reports/1595299

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 1:54pm (UTC)
Apache HTTP Server: mod_proxy_ajp: Possible request smuggling

πŸ‘‰ https://hackerone.com/reports/1594627

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #ricterz
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 7:25pm (UTC)
DoS via lua_read_body() [zhbug_httpd_94]

πŸ‘‰ https://hackerone.com/reports/1596252

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #tdp3kel9g
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 9, 2022, 8:19pm (UTC)
Blind SSRF at packagist.maximum.nl

πŸ‘‰ https://hackerone.com/reports/1538056

πŸ”Ή Severity: No Rating | πŸ’° 75 USD
πŸ”Ή Reported To: Radancy
πŸ”Ή Reported By: #dk4trin
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 10, 2022, 12:38pm (UTC)
Homograph attack bypass cause redirection

πŸ‘‰ https://hackerone.com/reports/1285245

πŸ”Ή Severity: No Rating | πŸ’° 50 USD
πŸ”Ή Reported To: Vanilla
πŸ”Ή Reported By: #malek
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 10, 2022, 9:38pm (UTC)