Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
TikTok Account Creation Date Information Disclosure

πŸ‘‰ https://hackerone.com/reports/1562020

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #f15
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 18, 2022, 8:50pm (UTC)
Access to private file's of helpdesk.

πŸ‘‰ https://hackerone.com/reports/804534

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 18, 2022, 9:05pm (UTC)
Sub-Dept User Can Add User's To Main Department.

πŸ‘‰ https://hackerone.com/reports/890209

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 18, 2022, 9:08pm (UTC)
Users Without Permission Can Download Restricted Files

πŸ‘‰ https://hackerone.com/reports/794904

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 18, 2022, 9:10pm (UTC)
DOM XSS at `https://adobedocs.github.io/OAE_PartnerAPI/?configUrl={site}` due to outdated Swagger UI

πŸ‘‰ https://hackerone.com/reports/1736378

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #dreamer_eh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 12:07pm (UTC)
IDOR able to buy a plan with lesser fee

πŸ‘‰ https://hackerone.com/reports/1679276

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #ug0x01
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: October 19, 2022, 4:20pm (UTC)
Fully TaxJar account control and ability to disclose and modify business account settings Due to Broken Access Control in /current_user_data

πŸ‘‰ https://hackerone.com/reports/1677541

πŸ”Ή Severity: Medium | πŸ’° 1,000 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #mr_asg
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 6:36pm (UTC)
Tomcat Servlet Examples accessible at https://44.240.33.83:38443 and https://52.36.56.155:38443

πŸ‘‰ https://hackerone.com/reports/1560149

πŸ”Ή Severity: Medium | πŸ’° 1,500 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #mustafa_farrag
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 6:45pm (UTC)
Bypassing domain deny_list rule in Smokescreen via double brackets [[]] which leads to SSRF

πŸ‘‰ https://hackerone.com/reports/1580495

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #sim4n6
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 6:47pm (UTC)
User information disclosed via API

πŸ‘‰ https://hackerone.com/reports/1218461

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. General Services Administration
πŸ”Ή Reported By: #toormund
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 6:47pm (UTC)
Local applications from user's computer can listen for webhooks via insecure gRPC server from stripe-cli

πŸ‘‰ https://hackerone.com/reports/1369191

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #gregxsunday
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 7:03pm (UTC)
πŸ‘1
Mass Accounts Takeover Without any user Interaction at https://app.taxjar.com/

πŸ‘‰ https://hackerone.com/reports/1685970

πŸ”Ή Severity: High | πŸ’° 13,000 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #mr_asg
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 7:05pm (UTC)
[CSRF] No Csrf protection against sending invitation to join the team.

πŸ‘‰ https://hackerone.com/reports/728199

πŸ”Ή Severity: Medium | πŸ’° 1,000 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 20, 2022, 12:31am (UTC)
Ability to View Non-Permitted Admin Log

πŸ‘‰ https://hackerone.com/reports/1533220

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 20, 2022, 12:34am (UTC)
Removed user can still view comments on the file/documents.

πŸ‘‰ https://hackerone.com/reports/1335070

πŸ”Ή Severity: Medium | πŸ’° 750 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 20, 2022, 12:36am (UTC)
POOL_UPGRADE request handler may allow an unauthenticated attacker to remotely execute code on every node in the network.

πŸ‘‰ https://hackerone.com/reports/1705717

πŸ”Ή Severity: Critical | πŸ’° 2,000 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #shakedreiner
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 20, 2022, 8:07pm (UTC)
Card requirement bypass for business trial

πŸ‘‰ https://hackerone.com/reports/1670304

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Krisp
πŸ”Ή Reported By: #n0_m3rcy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 21, 2022, 4:23pm (UTC)
access nagios dashboard using default credentials in ** omon1.fpki.gov, 3.220.248.203**

πŸ‘‰ https://hackerone.com/reports/1700896

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. General Services Administration
πŸ”Ή Reported By: #ahmed0x0mahmoud
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 21, 2022, 11:33pm (UTC)
installed.json sensitive file was publicly accessible on your web application which discloses information about authors and admins

πŸ‘‰ https://hackerone.com/reports/1586524

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #whitehacker18
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: October 22, 2022, 6:39pm (UTC)
Viewer is able to leak the previous versions of the file

πŸ‘‰ https://hackerone.com/reports/1080700

πŸ”Ή Severity: Medium | πŸ’° 550 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 24, 2022, 9:56pm (UTC)
IDOR Allows Viewer to Delete Bin's Files

πŸ‘‰ https://hackerone.com/reports/1074420

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 24, 2022, 9:59pm (UTC)