Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
CVE-2021-40438 on cp-eu2.acronis.com

πŸ‘‰ https://hackerone.com/reports/1370731

πŸ”Ή Severity: High | πŸ’° 150 USD
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #savik
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 3:17am (UTC)
rubygems.org Batching attack to `confirmation_token` by bypass rate limit

πŸ‘‰ https://hackerone.com/reports/1559262

πŸ”Ή Severity: Low | πŸ’° 480 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #ooooooo_q
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 4:04am (UTC)
One Click XSS in [www.shopify.com]

πŸ‘‰ https://hackerone.com/reports/1563334

πŸ”Ή Severity: No Rating | πŸ’° 500 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #comwrg
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 6:13am (UTC)
Undici ProxyAgent vulnerable to MITM

πŸ‘‰ https://hackerone.com/reports/1599063

πŸ”Ή Severity: High | πŸ’° 1,000 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #pimterry
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 1:20pm (UTC)
Undici does not use CONNECT or otherwise validate upstream HTTPS certificates when using a proxy

πŸ‘‰ https://hackerone.com/reports/1583680

πŸ”Ή Severity: High
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #pimterry
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 2:47pm (UTC)
Stored XSS for Grafana dashboard URL

πŸ‘‰ https://hackerone.com/reports/684268

πŸ”Ή Severity: High | πŸ’° 2,500 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #xanbanx
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 13, 2022, 3:12pm (UTC)
πŸ‘1
[h1-2102] shopApps query from the graphql at /users/api returns all existing created apps, including private ones

πŸ‘‰ https://hackerone.com/reports/1085332

πŸ”Ή Severity: Medium | πŸ’° 1,900 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #inhibitor181
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 15, 2022, 8:23am (UTC)
πŸ‘3
POST BASED REFLECTED XSS IN dailydeals.mtn.co.za

πŸ‘‰ https://hackerone.com/reports/1451394

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #shuvam321
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 15, 2022, 9:56am (UTC)
Add me email address Authentication bypass

πŸ‘‰ https://hackerone.com/reports/1607645

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: LinkedIn
πŸ”Ή Reported By: #raajeevrathnam
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: July 15, 2022, 4:33pm (UTC)
Insecure Object Permissions for Guest User leads to access to internal documents!

πŸ‘‰ https://hackerone.com/reports/1089583

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: IBM
πŸ”Ή Reported By: #mocr7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 15, 2022, 5:40pm (UTC)
Can use the Reddit android app as usual even though revoking the access of it from reddit.com

πŸ‘‰ https://hackerone.com/reports/1632186

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #sateeshn
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: July 16, 2022, 11:10am (UTC)
Information disclosure ( Google Sales Channel )

πŸ‘‰ https://hackerone.com/reports/1584718

πŸ”Ή Severity: No Rating | πŸ’° 500 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #hydraxanon82
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 17, 2022, 2:10pm (UTC)
Open Redirect β–ˆβ–ˆβ–ˆ.8x8.com

πŸ‘‰ https://hackerone.com/reports/1637571

πŸ”Ή Severity: Low
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #mr_k0anti
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 17, 2022, 11:54pm (UTC)
Public Apache Tomcat /examples example directory

πŸ‘‰ https://hackerone.com/reports/1622624

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #mr_k0anti
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 18, 2022, 12:04am (UTC)
CVE-2019-11248 on https://β–ˆ.β–ˆ.β–ˆ.β–ˆ:9100/debug/pprof/goroutine

πŸ‘‰ https://hackerone.com/reports/1607940

πŸ”Ή Severity: Low
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #mr_k0anti
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 18, 2022, 12:14am (UTC)
Cross-site scripting (DOM-based)

πŸ‘‰ https://hackerone.com/reports/1512644

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: OneWeb
πŸ”Ή Reported By: #thewikiii
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: July 18, 2022, 9:50am (UTC)
unauth mosquitto ( client emails, ips, license keys exposure )

πŸ‘‰ https://hackerone.com/reports/1578574

πŸ”Ή Severity: Medium | πŸ’° 150 USD
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #second_grade_pentester
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 18, 2022, 11:39am (UTC)
subdomain takeover at odoo-staging.exness.io

πŸ‘‰ https://hackerone.com/reports/1540252

πŸ”Ή Severity: Medium | πŸ’° 100 USD
πŸ”Ή Reported To: EXNESS
πŸ”Ή Reported By: #omer
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 18, 2022, 2:43pm (UTC)
Without verifying email and activate account, user can perform all action which are not supposed to be done

πŸ‘‰ https://hackerone.com/reports/1272305

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #tabaahi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 18, 2022, 3:44pm (UTC)
HTML Injection in E-mail Not Resolved ()

πŸ‘‰ https://hackerone.com/reports/1600720

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #thewikiii
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 19, 2022, 9:11am (UTC)
LFI via Jolokia at https://β–ˆ.β–ˆ.β–ˆ.β–ˆ:1293

πŸ‘‰ https://hackerone.com/reports/1641661

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #shuvam321
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 20, 2022, 12:30am (UTC)
πŸ‘1