Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Admin panel Exposure without credential at https://plus-website.shopifycloud.com/admin.php

πŸ‘‰ https://hackerone.com/reports/1417288

πŸ”Ή Severity: Medium | πŸ’° 2,900 USD
πŸ”Ή Reported To: Shopify
πŸ”Ή Reported By: #0x50d
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 11, 2022, 10:21pm (UTC)
πŸ‘1
Wordpress Users Disclosure (/wp-json/wp/v2/users/)

πŸ‘‰ https://hackerone.com/reports/1663363

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Top Echelon Software
πŸ”Ή Reported By: #hammodmt
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 11, 2022, 8:46pm (UTC)
πŸ”₯1
Disabling context isolation, nodeIntegrationInSubFrames using an unauthorised frame.

πŸ‘‰ https://hackerone.com/reports/1647287

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #s1r1u5
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 11, 2022, 11:08pm (UTC)
Reflected XSS at https://stories.showmax.com/wp-content/themes/theme-internal_ss/blocks/ajax/a.php via `ss_country_filter` param

πŸ‘‰ https://hackerone.com/reports/1663202

πŸ”Ή Severity: Medium | πŸ’° 150 USD
πŸ”Ή Reported To: Showmax
πŸ”Ή Reported By: #miron666
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 12, 2022, 12:51pm (UTC)
πŸ‘1
Cross Site Scripting Vulnerability in fabric-sdk-py source code

πŸ‘‰ https://hackerone.com/reports/1670187

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #bhaskar_ram
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: August 17, 2022, 2:53pm (UTC)
Delimiter injection in GitHub Actions core.exportVariable

πŸ‘‰ https://hackerone.com/reports/1625652

πŸ”Ή Severity: Medium | πŸ’° 4,617 USD
πŸ”Ή Reported To: GitHub
πŸ”Ή Reported By: #jupenur
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 18, 2022, 7:44pm (UTC)
CSRF Account Takeover

πŸ‘‰ https://hackerone.com/reports/1253462

πŸ”Ή Severity: High | πŸ’° 2,373 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #s3c
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 16, 2022, 9:04pm (UTC)
πŸ”₯2😱1
IDOR on TikTok Seller

πŸ‘‰ https://hackerone.com/reports/1509057

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #aidilarf_2000
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 16, 2022, 9:07pm (UTC)
πŸ‘2
IDOR allowing to read another user's token on the Social Media Ads service

πŸ‘‰ https://hackerone.com/reports/1464168

πŸ”Ή Severity: High | πŸ’° 2,000 USD
πŸ”Ή Reported To: Semrush
πŸ”Ή Reported By: #a_d_a_m
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 16, 2022, 7:47am (UTC)
πŸ‘1
Ingress-nginx annotation injection allows retrieval of ingress-nginx serviceaccount token and secrets across all namespaces

πŸ‘‰ https://hackerone.com/reports/1378175

πŸ”Ή Severity: High | πŸ’° 2,500 USD
πŸ”Ή Reported To: Kubernetes
πŸ”Ή Reported By: #amlweems
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 13, 2022, 6:13pm (UTC)
Stored XSS on TikTok Ads

πŸ‘‰ https://hackerone.com/reports/1504202

πŸ”Ή Severity: Medium | πŸ’° 2,500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #sinayeganeh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 19, 2022, 1:14am (UTC)
πŸ‘1
RPC call crashes node

πŸ‘‰ https://hackerone.com/reports/1379707

πŸ”Ή Severity: High
πŸ”Ή Reported To: Monero
πŸ”Ή Reported By: #xfang
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 20, 2022, 3:41am (UTC)
πŸ‘1
Blind SSRF External Interaction on https://mtngbissau.com/

πŸ‘‰ https://hackerone.com/reports/1220688

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #error201
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 21, 2022, 8:40am (UTC)
XSS and HTML Injection on the pressable.com search box

πŸ‘‰ https://hackerone.com/reports/1537149

πŸ”Ή Severity: Medium | πŸ’° 250 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #sawrav-chowdhury
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 23, 2022, 6:30pm (UTC)
support.invisionpower.com takeover the subdomain with Zendesk

πŸ‘‰ https://hackerone.com/reports/1646554

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Invision Power Services, Inc.
πŸ”Ή Reported By: #fthacker101
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 1:10pm (UTC)
Off-by-slash vulnerability in nodejs.org and iojs.org

πŸ‘‰ https://hackerone.com/reports/1631350

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #nagaro
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 2:11pm (UTC)
Golang expvar Information Disclosure

πŸ‘‰ https://hackerone.com/reports/1650035

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: Uber
πŸ”Ή Reported By: #mustafa_farrag
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 3:44pm (UTC)
Reflected XSS on pages.email.sel.sony.com/page.aspx via jobid parameter

πŸ‘‰ https://hackerone.com/reports/1309949

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Sony
πŸ”Ή Reported By: #leo_rac
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 5:59pm (UTC)
NordVPN Linux Client - Unsafe service file permissions leads to Local Privilege Escalation

πŸ‘‰ https://hackerone.com/reports/1218523

πŸ”Ή Severity: Medium | πŸ’° 700 USD
πŸ”Ή Reported To: Nord Security
πŸ”Ή Reported By: #bashketchum
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 6:48pm (UTC)
Pause-based desync in Apache HTTPD

πŸ‘‰ https://hackerone.com/reports/1667974

πŸ”Ή Severity: High | πŸ’° 4,000 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #albinowax
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 25, 2022, 7:02am (UTC)
πŸ”₯4πŸ‘1
Default Login Credentials on https://broadbandmaps.mtn.com.gh/

πŸ‘‰ https://hackerone.com/reports/1297480

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #theranger
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 25, 2022, 11:05am (UTC)