Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Weak/Auto Fill Password

πŸ‘‰ https://hackerone.com/reports/817331

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #harrisoft
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 12:23am (UTC)
Federated share accepting/declining is not logged in audit log

πŸ‘‰ https://hackerone.com/reports/1200815

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #rtod
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 6:12am (UTC)
Password disclosure in initial setup of Mail App

πŸ‘‰ https://hackerone.com/reports/1561471

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #anna_larch
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 6:23am (UTC)
Brute force protections don't work

πŸ‘‰ https://hackerone.com/reports/1596918

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #nickvergessen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 6:25am (UTC)
Unauthenticated SSRF in 3rd party module "cerdic/csstidy"

πŸ‘‰ https://hackerone.com/reports/1595006

πŸ”Ή Severity: Medium | πŸ’° 250 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #eg42
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 6:29am (UTC)
path traversal vulnerability in Grafana 8.x allows " local file read "

πŸ‘‰ https://hackerone.com/reports/1427086

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #a-heybati
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 3, 2022, 12:14pm (UTC)
IDOR Leads To Account Takeover Without User Interaction

πŸ‘‰ https://hackerone.com/reports/1272478

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #theranger
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 4, 2022, 1:23pm (UTC)
API key (api.semrush.com) leak in JS-file

πŸ‘‰ https://hackerone.com/reports/1218754

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Semrush
πŸ”Ή Reported By: #a_d_a_m
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 12:17pm (UTC)
Information disclosure through django debug mode

πŸ‘‰ https://hackerone.com/reports/1434276

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 10:56pm (UTC)
Exposed gitlab repo at https://adammanco.mtn.com/api/v4/projects

πŸ‘‰ https://hackerone.com/reports/1351359

πŸ”Ή Severity: Low
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 10:57pm (UTC)
CVE-2021-38314 @ https://www.mtn.co.rw

πŸ‘‰ https://hackerone.com/reports/1351341

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 10:58pm (UTC)
CVE-2021-38314 @ https://www.mtn.ci

πŸ‘‰ https://hackerone.com/reports/1351338

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 10:58pm (UTC)
firebase credentials leaks @ https://mpulse.mtnonline.com

πŸ‘‰ https://hackerone.com/reports/1351329

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 10:59pm (UTC)
firebase credentials leaks @ https://mtnhottseat.mtn.com.gh

πŸ‘‰ https://hackerone.com/reports/1351326

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 10:59pm (UTC)
No password length restriction in reset password endpoint at https://suppliers.mtn.cm

πŸ‘‰ https://hackerone.com/reports/1285694

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 5, 2022, 11:00pm (UTC)
IDOR Payments Status

πŸ‘‰ https://hackerone.com/reports/1538669

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Omise
πŸ”Ή Reported By: #codeslayer137
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 8:58am (UTC)
Modifying Sprunk vs eCola crew data

πŸ‘‰ https://hackerone.com/reports/1680818

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Rockstar Games
πŸ”Ή Reported By: #bugstar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:24pm (UTC)
Subdomain takeover of β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1457928

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #martinvw
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:50pm (UTC)
The dashboard is exposed in https://β–ˆβ–ˆβ–ˆ

πŸ‘‰ https://hackerone.com/reports/1566758

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #alitoni224
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:53pm (UTC)
XSS DUE TO CVE-2020-3580

πŸ‘‰ https://hackerone.com/reports/1606068

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #cruxn3t
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:55pm (UTC)
Access to admininstrative resources/account via path traversal

πŸ‘‰ https://hackerone.com/reports/1326352

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #j4k3d
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 6, 2022, 6:59pm (UTC)