Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Possible to make restricted files public on Phabricator via Diffusion

πŸ‘‰ https://hackerone.com/reports/1560717

πŸ”Ή Severity: No Rating | πŸ’° 2,000 USD
πŸ”Ή Reported To: Phabricator
πŸ”Ή Reported By: #dyls
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 29, 2022, 10:37pm (UTC)
Open redirection at https://smartreports.mtncameroon.net

πŸ‘‰ https://hackerone.com/reports/1530396

πŸ”Ή Severity: Low
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #vulnera
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 30, 2022, 1:38am (UTC)
Corsa Site Scripting Vulnerability (XSS)

πŸ‘‰ https://hackerone.com/reports/1650210

πŸ”Ή Severity: High
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #bhaskar_ram
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: July 30, 2022, 2:37pm (UTC)
Open S3 Bucket Accessible by any Aws User

πŸ‘‰ https://hackerone.com/reports/1654145

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: GoCD
πŸ”Ή Reported By: #khalidou
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: July 31, 2022, 3:02am (UTC)
Race condition on https://judge.me/people

πŸ‘‰ https://hackerone.com/reports/1566017

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Judge.me
πŸ”Ή Reported By: #netboom
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 1, 2022, 5:28am (UTC)
πŸ‘1
Insecure use of shell.openExternal() in Rocket.Chat Desktop App leading to RCE

πŸ‘‰ https://hackerone.com/reports/924151

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #baltpeter
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 1, 2022, 10:17am (UTC)
delete the subaccount from the user id

πŸ‘‰ https://hackerone.com/reports/1646340

πŸ”Ή Severity: Medium | πŸ’° 700 USD
πŸ”Ή Reported To: Showmax
πŸ”Ή Reported By: #qualwin38000
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 1, 2022, 1:05pm (UTC)
Insecure TLS Configuration #3530

πŸ‘‰ https://hackerone.com/reports/1639423

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #bhaskar_ram
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: August 1, 2022, 2:04pm (UTC)
Found Origin IP's lead to access to gitlab

πŸ‘‰ https://hackerone.com/reports/1637577

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #m-narayanan
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: August 2, 2022, 4:51am (UTC)
One-click account hijack for anyone using Apple sign-in with Reddit, due to response-type switch + leaking href to XSS on www.redditmedia.com

πŸ‘‰ https://hackerone.com/reports/1567186

πŸ”Ή Severity: Critical | πŸ’° 10,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #fransrosen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 2, 2022, 3:13pm (UTC)
πŸ”₯8πŸ‘3
XSS in redditmedia.com can compromise data of reddit.com

πŸ‘‰ https://hackerone.com/reports/862882

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #keer0k
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: August 3, 2022, 3:40pm (UTC)
Unrestricted File Upload Blind Stored Xss in subdomain ads.tiktok.com

πŸ‘‰ https://hackerone.com/reports/1577370

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #mrzheev
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 4, 2022, 1:31am (UTC)
πŸ‘1
Sensei LMS IDOR to send message

πŸ‘‰ https://hackerone.com/reports/1592596

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #ghimire_veshraj
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 4, 2022, 10:17am (UTC)
Unauthenticated Private Messages DIsclosure via wordpress Rest API

πŸ‘‰ https://hackerone.com/reports/1590237

πŸ”Ή Severity: Medium | πŸ’° 350 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #ghimire_veshraj
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 4, 2022, 10:45am (UTC)
Getting access of mod logs from any public or restricted subreddit with IDOR vulnerability

πŸ‘‰ https://hackerone.com/reports/1658418

πŸ”Ή Severity: High | πŸ’° 5,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #high_ping_ninja
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 4, 2022, 7:38pm (UTC)
πŸ‘3
Fix : (Security) Mitigate Path Traversal Bug

πŸ‘‰ https://hackerone.com/reports/1635321

πŸ”Ή Severity: Low | πŸ’° 200 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #bhaskar_ram
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 5, 2022, 9:41pm (UTC)
Ingress-nginx path allows retrieval of ingress-nginx serviceaccount token

πŸ‘‰ https://hackerone.com/reports/1382919

πŸ”Ή Severity: High | πŸ’° 2,500 USD
πŸ”Ή Reported To: Kubernetes
πŸ”Ή Reported By: #gaffy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 7:14am (UTC)
πŸ‘1
cross site scripting in : mtn.bj

πŸ‘‰ https://hackerone.com/reports/1264834

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #alimanshester
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 11:19am (UTC)
RCE vulnerability in Hyperledger Fabric SDK for Java

πŸ‘‰ https://hackerone.com/reports/801370

πŸ”Ή Severity: Medium | πŸ’° 200 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #freskimo
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 5:37pm (UTC)
HTTP PUT method is enabled downloader.ratelimited.me

πŸ‘‰ https://hackerone.com/reports/545136

πŸ”Ή Severity: High
πŸ”Ή Reported To: RATELIMITED
πŸ”Ή Reported By: #codeslayer137
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 7, 2022, 2:01am (UTC)
Brute Force of fabric-ca server admin account

πŸ‘‰ https://hackerone.com/reports/411364

πŸ”Ή Severity: High | πŸ’° 1,500 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #xiaoc
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 5:36pm (UTC)