Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
I found another way to bypass Cloudflare Warp lock!

πŸ‘‰ https://hackerone.com/reports/1605847

πŸ”Ή Severity: High | πŸ’° 1,000 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #joshatmotion
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 7, 2022, 11:02am (UTC)
Exceed photo dimensions, Flickr.com

πŸ‘‰ https://hackerone.com/reports/1755552

πŸ”Ή Severity: Low | πŸ’° 50 USD
πŸ”Ή Reported To: Flickr
πŸ”Ή Reported By: #0xcyborg
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: November 7, 2022, 5:53pm (UTC)
Subdomain Takeover via Unclaimed Amazon S3 Bucket (Musical.ly)

πŸ‘‰ https://hackerone.com/reports/1102537

πŸ”Ή Severity: Low | πŸ’° 200 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #daik0n
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 7, 2022, 9:34pm (UTC)
Public Github Repo Leaking Internal Credentials

πŸ‘‰ https://hackerone.com/reports/1763266

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #xinfohuggerx
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: November 7, 2022, 11:45pm (UTC)
[Kafka Connect] [JdbcSinkConnector][HttpSinkConnector] RCE by leveraging file upload via SQLite JDBC driver and SSRF to internal Jolokia

πŸ‘‰ https://hackerone.com/reports/1547877

πŸ”Ή Severity: Critical | πŸ’° 5,000 USD
πŸ”Ή Reported To: Aiven Ltd
πŸ”Ή Reported By: #jarij
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 8, 2022, 6:29am (UTC)
Grafana RCE via SMTP server parameter injection

πŸ‘‰ https://hackerone.com/reports/1200647

πŸ”Ή Severity: Critical | πŸ’° 5,000 USD
πŸ”Ή Reported To: Aiven Ltd
πŸ”Ή Reported By: #jarij
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 8, 2022, 6:29am (UTC)
Kafka Connect RCE via connector SASL JAAS JndiLoginModule configuration

πŸ‘‰ https://hackerone.com/reports/1529790

πŸ”Ή Severity: Critical | πŸ’° 5,000 USD
πŸ”Ή Reported To: Aiven Ltd
πŸ”Ή Reported By: #jarij
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 8, 2022, 6:30am (UTC)
Apache Flink RCE via GET jar/plan API Endpoint

πŸ‘‰ https://hackerone.com/reports/1418891

πŸ”Ή Severity: Critical | πŸ’° 6,000 USD
πŸ”Ή Reported To: Aiven Ltd
πŸ”Ή Reported By: #jarij
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 8, 2022, 6:30am (UTC)
Self-XSS on Suggest Tag dialog box

πŸ‘‰ https://hackerone.com/reports/1761505

πŸ”Ή Severity: Low | πŸ’° 50 USD
πŸ”Ή Reported To: XVIDEOS
πŸ”Ή Reported By: #j3rry4unt
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 8, 2022, 7:19pm (UTC)
Host Header Injection Attack - www.xnxx.com

πŸ‘‰ https://hackerone.com/reports/1630073

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: XVIDEOS
πŸ”Ή Reported By: #cyber_anon
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: November 8, 2022, 7:25pm (UTC)
api keys leaked

πŸ‘‰ https://hackerone.com/reports/1762927

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #saibalajis6
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: November 10, 2022, 2:40pm (UTC)
sensitive data exposure

πŸ‘‰ https://hackerone.com/reports/1716249

πŸ”Ή Severity: High
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #saibalajis6
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: November 10, 2022, 2:41pm (UTC)
Business Suite "Get Leads" Resulting in Revealing User Email & Phone

πŸ‘‰ https://hackerone.com/reports/1744194

πŸ”Ή Severity: High | πŸ’° 5,500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #datph4m
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 10, 2022, 11:41pm (UTC)
Subdomain Takeover on delivey.yelp.com

πŸ‘‰ https://hackerone.com/reports/1715538

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #racersaravanaa05
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: November 12, 2022, 3:49pm (UTC)
Subdomain takeover at https://test.www.midigator.com

πŸ‘‰ https://hackerone.com/reports/1718371

πŸ”Ή Severity: High
πŸ”Ή Reported To: Equifax
πŸ”Ή Reported By: #valluvarsploit_h1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 12, 2022, 4:05pm (UTC)
Admin can create a hidden admin account which even the owner can not detect and remove and do administrative actions on the application.

πŸ‘‰ https://hackerone.com/reports/1596663

πŸ”Ή Severity: High | πŸ’° 5,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #41bin
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 14, 2022, 4:34am (UTC)
Open redirect at mc-beta-cloud-acronis.com

πŸ‘‰ https://hackerone.com/reports/846389

πŸ”Ή Severity: No Rating
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #angeltsvetkov
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 15, 2022, 9:49am (UTC)
New /add_contacts /remove_contacts quick commands susseptible to XSS from Customer Contact firstname/lastname fields

πŸ‘‰ https://hackerone.com/reports/1578400

πŸ”Ή Severity: High | πŸ’° 13,950 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #cryptopone
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 16, 2022, 1:07am (UTC)
XSS: `v-safe-html` is not safe enough

πŸ‘‰ https://hackerone.com/reports/1579645

πŸ”Ή Severity: High | πŸ’° 6,580 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #yvvdwf
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 16, 2022, 1:08am (UTC)
CSP-bypass XSS in project settings page

πŸ‘‰ https://hackerone.com/reports/1588732

πŸ”Ή Severity: High | πŸ’° 10,270 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #yvvdwf
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 16, 2022, 1:08am (UTC)
RCE via github import

πŸ‘‰ https://hackerone.com/reports/1672388

πŸ”Ή Severity: Critical | πŸ’° 33,510 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #yvvdwf
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 16, 2022, 1:10am (UTC)