Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Fix : (Security) Mitigate Path Traversal Bug

πŸ‘‰ https://hackerone.com/reports/1635321

πŸ”Ή Severity: Low | πŸ’° 200 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #bhaskar_ram
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 5, 2022, 9:41pm (UTC)
Ingress-nginx path allows retrieval of ingress-nginx serviceaccount token

πŸ‘‰ https://hackerone.com/reports/1382919

πŸ”Ή Severity: High | πŸ’° 2,500 USD
πŸ”Ή Reported To: Kubernetes
πŸ”Ή Reported By: #gaffy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 7:14am (UTC)
πŸ‘1
cross site scripting in : mtn.bj

πŸ‘‰ https://hackerone.com/reports/1264834

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #alimanshester
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 11:19am (UTC)
RCE vulnerability in Hyperledger Fabric SDK for Java

πŸ‘‰ https://hackerone.com/reports/801370

πŸ”Ή Severity: Medium | πŸ’° 200 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #freskimo
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 5:37pm (UTC)
HTTP PUT method is enabled downloader.ratelimited.me

πŸ‘‰ https://hackerone.com/reports/545136

πŸ”Ή Severity: High
πŸ”Ή Reported To: RATELIMITED
πŸ”Ή Reported By: #codeslayer137
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 7, 2022, 2:01am (UTC)
Brute Force of fabric-ca server admin account

πŸ‘‰ https://hackerone.com/reports/411364

πŸ”Ή Severity: High | πŸ’° 1,500 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #xiaoc
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 5:36pm (UTC)
Enrolling to a CA that returns an empty response crashes the node process

πŸ‘‰ https://hackerone.com/reports/506412

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #mttrbrts
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 6, 2022, 5:37pm (UTC)
Anonymous access control - Payments Status

πŸ‘‰ https://hackerone.com/reports/1546726

πŸ”Ή Severity: Medium | πŸ’° 100 USD
πŸ”Ή Reported To: Omise
πŸ”Ή Reported By: #codeslayer137
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 7, 2022, 1:59am (UTC)
Lack of Rate limit while joining video call in talk section which is password protected

πŸ‘‰ https://hackerone.com/reports/1596673

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #error2001
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 8, 2022, 6:58am (UTC)
xmlrpc.php FILE IS enable it will used for Bruteforce attack and Denial of Service(DoS)

πŸ‘‰ https://hackerone.com/reports/1622867

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Top Echelon Software
πŸ”Ή Reported By: #anonymmert12
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 8, 2022, 1:35pm (UTC)
Ability to escape database transaction through SQL injection, leading to arbitrary code execution

πŸ‘‰ https://hackerone.com/reports/1663299

πŸ”Ή Severity: High
πŸ”Ή Reported To: HackerOne
πŸ”Ή Reported By: #jobert
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 9, 2022, 6:58pm (UTC)
[CRITICAL] Full account takeover without user interaction on sign with Apple flow

πŸ‘‰ https://hackerone.com/reports/1639802

πŸ”Ή Severity: Critical | πŸ’° 3,000 USD
πŸ”Ή Reported To: Glassdoor
πŸ”Ή Reported By: #emanelyazji
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 9, 2022, 7:26pm (UTC)
πŸ”₯3
Read-only administrator can change agent update settings

πŸ‘‰ https://hackerone.com/reports/1538004

πŸ”Ή Severity: Medium | πŸ’° 200 USD
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #mega7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 10, 2022, 9:38am (UTC)
πŸ‘1
many commands can be manipulated to delete identities or affiliations

πŸ‘‰ https://hackerone.com/reports/348090

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #cet2000
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 10, 2022, 2:23pm (UTC)
Redirection in Repeater & Intruder Tab

πŸ‘‰ https://hackerone.com/reports/1541301

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: PortSwigger Web Security
πŸ”Ή Reported By: #mr_vrush
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 11, 2022, 11:09am (UTC)
Disable xmlrpc.php file

πŸ‘‰ https://hackerone.com/reports/712321

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Top Echelon Software
πŸ”Ή Reported By: #sohelahmed786
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 11, 2022, 12:50pm (UTC)
fix(security):Path Traversal Bug

πŸ‘‰ https://hackerone.com/reports/1664244

πŸ”Ή Severity: High
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #bhaskar_ram
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: August 11, 2022, 7:53pm (UTC)
Admin panel Exposure without credential at https://plus-website.shopifycloud.com/admin.php

πŸ‘‰ https://hackerone.com/reports/1417288

πŸ”Ή Severity: Medium | πŸ’° 2,900 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #0x50d
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 11, 2022, 10:21pm (UTC)
πŸ‘1
Wordpress Users Disclosure (/wp-json/wp/v2/users/)

πŸ‘‰ https://hackerone.com/reports/1663363

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Top Echelon Software
πŸ”Ή Reported By: #hammodmt
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 11, 2022, 8:46pm (UTC)
πŸ”₯1
Disabling context isolation, nodeIntegrationInSubFrames using an unauthorised frame.

πŸ‘‰ https://hackerone.com/reports/1647287

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #s1r1u5
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 11, 2022, 11:08pm (UTC)
Reflected XSS at https://stories.showmax.com/wp-content/themes/theme-internal_ss/blocks/ajax/a.php via `ss_country_filter` param

πŸ‘‰ https://hackerone.com/reports/1663202

πŸ”Ή Severity: Medium | πŸ’° 150 USD
πŸ”Ή Reported To: Showmax
πŸ”Ή Reported By: #miron666
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 12, 2022, 12:51pm (UTC)
πŸ‘1