Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
installed.json sensitive file was publicly accessible on your web application which discloses information about authors and admins

πŸ‘‰ https://hackerone.com/reports/1586524

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #whitehacker18
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: October 22, 2022, 6:39pm (UTC)
Viewer is able to leak the previous versions of the file

πŸ‘‰ https://hackerone.com/reports/1080700

πŸ”Ή Severity: Medium | πŸ’° 550 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 24, 2022, 9:56pm (UTC)
IDOR Allows Viewer to Delete Bin's Files

πŸ‘‰ https://hackerone.com/reports/1074420

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 24, 2022, 9:59pm (UTC)
Remotely Accessible Container Advisor exposed performance metrics and resource usage

πŸ‘‰ https://hackerone.com/reports/1697599

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #tw4v3sx
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 24, 2022, 10:07pm (UTC)
A malicious admin can be able to permanently disable a Owner(Admin) to access his account

πŸ‘‰ https://hackerone.com/reports/1718574

πŸ”Ή Severity: Medium | πŸ’° 600 USD
πŸ”Ή Reported To: Linktree
πŸ”Ή Reported By: #dewcode91
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 25, 2022, 12:49am (UTC)
Reflected Cross site scripting via Swagger UI

πŸ‘‰ https://hackerone.com/reports/1656650

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #webcipher101
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 25, 2022, 7:14am (UTC)
Business Logic, currency arbitrage - Possibility to pay less than the price in USD

πŸ‘‰ https://hackerone.com/reports/1677155

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: PortSwigger Web Security
πŸ”Ή Reported By: #xctzn
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: October 26, 2022, 6:57am (UTC)
HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding (improper fix for CVE-2022-32215)

πŸ‘‰ https://hackerone.com/reports/1665156

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #shacharm
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:17am (UTC)
Node 18 reads openssl.cnf from /home/iojs/build/... upon startup on MacOS

πŸ‘‰ https://hackerone.com/reports/1695596

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #mhdawson
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:17am (UTC)
CVE-2022-32213 bypass via obs-fold mechanic

πŸ‘‰ https://hackerone.com/reports/1630336

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:17am (UTC)
HTTP Request Smuggling Due to Incorrect Parsing of Header Fields

πŸ‘‰ https://hackerone.com/reports/1675191

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #vvx7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:17am (UTC)
Weak randomness in WebCrypto keygen

πŸ‘‰ https://hackerone.com/reports/1690000

πŸ”Ή Severity: High
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #bnoordhuis
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:18am (UTC)
πŸ‘1
Subdomain takeover on 'de-headless.staging.gymshark.com'

πŸ‘‰ https://hackerone.com/reports/1711890

πŸ”Ή Severity: High
πŸ”Ή Reported To: Gymshark
πŸ”Ή Reported By: #a-p0c
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 27, 2022, 11:14am (UTC)
CVE-2022-35260: .netrc parser out-of-bounds access

πŸ‘‰ https://hackerone.com/reports/1721098

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #kurohiro
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 27, 2022, 2:55pm (UTC)
πŸ‘1
CVE-2022-42916: HSTS bypass via IDN

πŸ‘‰ https://hackerone.com/reports/1730660

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #kurohiro
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 27, 2022, 2:55pm (UTC)
πŸ‘1
Jolokia Reflected XSS

πŸ‘‰ https://hackerone.com/reports/1714563

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Mars
πŸ”Ή Reported By: #ramzanrl
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 27, 2022, 5:36pm (UTC)
πŸ‘1
HTML INJECTION FOUND ON https://adobedocs.github.io/analytics-1.4-apis/swagger-docs.html DUE TO OUTDATED SWAGGER UI

πŸ‘‰ https://hackerone.com/reports/1736466

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #dreamer_eh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 28, 2022, 7:18am (UTC)
πŸ‘1
Privilege Escalation to All-staff group

πŸ‘‰ https://hackerone.com/reports/1021460

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 28, 2022, 11:55pm (UTC)
Accessing/Editing Folders of Other Users in the Orginisation.

πŸ‘‰ https://hackerone.com/reports/1025881

πŸ”Ή Severity: High | πŸ’° 1,000 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 29, 2022, 12:56am (UTC)
Cross-site Scripting (XSS) - Reflected

πŸ‘‰ https://hackerone.com/reports/1183336

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #lu3ky-13
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 30, 2022, 9:54pm (UTC)
Cross-Site Request Forgery (CSRF) to xss

πŸ‘‰ https://hackerone.com/reports/1183241

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #lu3ky-13
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 30, 2022, 9:54pm (UTC)