Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Enable 2Fa verification without verifying email leads account takeover

πŸ‘‰ https://hackerone.com/reports/1618021

πŸ”Ή Severity: Medium | πŸ’° 350 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #motu-vai
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 31, 2022, 3:43pm (UTC)
Password reset tokens sent to CSP reporting endpoints

πŸ‘‰ https://hackerone.com/reports/1626281

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Snapchat
πŸ”Ή Reported By: #mahfujwhh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 31, 2022, 11:53pm (UTC)
Any expired reset password link can still be used to reset the password

πŸ‘‰ https://hackerone.com/reports/1615790

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #mrccrqr
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 9:31am (UTC)
Remote denial of service in HyperLedger Fabric

πŸ‘‰ https://hackerone.com/reports/1635854

πŸ”Ή Severity: High | πŸ’° 1,500 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #fatal0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 2:05pm (UTC)
API Key reported in #1465145 not rotated and thus is still valid and can be used by anyone

πŸ‘‰ https://hackerone.com/reports/1591770

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #aneeeketh
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 1, 2022, 4:05pm (UTC)
Remote code execution due to unvalidated file upload

πŸ‘‰ https://hackerone.com/reports/1164452

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 5:29pm (UTC)
Password reset token leak on third party website via Referer header [cloudivr.mtnbusiness.com.ng]

πŸ‘‰ https://hackerone.com/reports/1320242

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #ibrahimatix0x01
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 8:21pm (UTC)
Default Admin Username and Password on remedysso.mtncameroon.net

πŸ‘‰ https://hackerone.com/reports/1397786

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #dh0pe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 8:50pm (UTC)
Sensitive Information Disclosure Through Config File

πŸ‘‰ https://hackerone.com/reports/1397788

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #dh0pe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 8:50pm (UTC)
IDOR on TikTok Ads Endpoint

πŸ‘‰ https://hackerone.com/reports/1527906

πŸ”Ή Severity: Medium | πŸ’° 2,500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #sinayeganeh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 9:23pm (UTC)
πŸ”₯2
Wordpress users disclosure from json and xml file

πŸ‘‰ https://hackerone.com/reports/1408589

πŸ”Ή Severity: Low
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #drak3hft7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 2, 2022, 9:25am (UTC)
Weak/Auto Fill Password

πŸ‘‰ https://hackerone.com/reports/817331

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #harrisoft
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 12:23am (UTC)
Federated share accepting/declining is not logged in audit log

πŸ‘‰ https://hackerone.com/reports/1200815

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #rtod
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 6:12am (UTC)
Password disclosure in initial setup of Mail App

πŸ‘‰ https://hackerone.com/reports/1561471

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #anna_larch
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 6:23am (UTC)
Brute force protections don't work

πŸ‘‰ https://hackerone.com/reports/1596918

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #nickvergessen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 6:25am (UTC)
Unauthenticated SSRF in 3rd party module "cerdic/csstidy"

πŸ‘‰ https://hackerone.com/reports/1595006

πŸ”Ή Severity: Medium | πŸ’° 250 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #eg42
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 6:29am (UTC)
path traversal vulnerability in Grafana 8.x allows " local file read "

πŸ‘‰ https://hackerone.com/reports/1427086

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #a-heybati
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 12:14pm (UTC)
IDOR Leads To Account Takeover Without User Interaction

πŸ‘‰ https://hackerone.com/reports/1272478

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #theranger
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 4, 2022, 1:23pm (UTC)
API key (api.semrush.com) leak in JS-file

πŸ‘‰ https://hackerone.com/reports/1218754

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Semrush
πŸ”Ή Reported By: #a_d_a_m
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 12:17pm (UTC)
Information disclosure through django debug mode

πŸ‘‰ https://hackerone.com/reports/1434276

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 10:56pm (UTC)
Exposed gitlab repo at https://adammanco.mtn.com/api/v4/projects

πŸ‘‰ https://hackerone.com/reports/1351359

πŸ”Ή Severity: Low
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 10:57pm (UTC)