Bugpoint
1.03K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties πŸ“£

RateπŸ‘‡
https://cutt.ly/bugpoint_rate
FeedbackπŸ‘‡
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Privilege Escalation on TikTok for Business

πŸ‘‰ https://hackerone.com/reports/1505567

πŸ”Ή Severity: Medium | πŸ’° 2,500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #naaash
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 16, 2022, 8:06pm (UTC)
πŸ‘1
[app.lemlist.com] Improper handling of payment lead to bypass payment

πŸ‘‰ https://hackerone.com/reports/1420697

πŸ”Ή Severity: High
πŸ”Ή Reported To: lemlist
πŸ”Ή Reported By: #omarelfarsaoui
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 17, 2022, 8:54am (UTC)
Integer overflow vulnerability

πŸ‘‰ https://hackerone.com/reports/1562515

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Glovo
πŸ”Ή Reported By: #0f1c3r
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 17, 2022, 1:46pm (UTC)
Conduit feed.publish API allows you to spoof other users or make it look like you have access to a restricted object

πŸ‘‰ https://hackerone.com/reports/1566325

πŸ”Ή Severity: No Rating | πŸ’° 300 USD
πŸ”Ή Reported To: Phabricator
πŸ”Ή Reported By: #dyls
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 18, 2022, 12:14pm (UTC)
Bypass global deny-lists by wrapping domains using "[]" in https://github.com/stripe/smokescreen

πŸ‘‰ https://hackerone.com/reports/1528242

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 18, 2022, 6:59pm (UTC)
XSS and iframe injection on tiktok ads portal using redirect params

πŸ‘‰ https://hackerone.com/reports/1514554

πŸ”Ή Severity: Medium | πŸ’° 1,000 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #cancerz
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 19, 2022, 2:49am (UTC)
Email html Injection

πŸ‘‰ https://hackerone.com/reports/1461194

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Slack
πŸ”Ή Reported By: #smitgharat0001
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 19, 2022, 1:03pm (UTC)
πŸ‘2
Stored XSS in repository file viewer

πŸ‘‰ https://hackerone.com/reports/1072868

πŸ”Ή Severity: Medium | πŸ’° 2,000 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #kannthu
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 19, 2022, 3:19pm (UTC)
8x8pilot.com: Reflected XSS in Apache Tomcat /jsp-examples example directory

πŸ‘‰ https://hackerone.com/reports/1400357

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #huntinex
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 19, 2022, 5:01pm (UTC)
Sensitive files/ data exists post deletion of user account

πŸ‘‰ https://hackerone.com/reports/1222873

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #geekysherlock
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 20, 2022, 9:25am (UTC)
πŸ‘2
Nextcloud Deck : Possibility for anyone to add a stack with existing tasks on anyone's board

πŸ‘‰ https://hackerone.com/reports/1450117

πŸ”Ή Severity: Medium | πŸ’° 250 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #supr4s
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 20, 2022, 10:37am (UTC)
Error in Deleting Deck cards attachment reveals the full path of the website

πŸ‘‰ https://hackerone.com/reports/1354334

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Nextcloud
πŸ”Ή Reported By: #ctulhu
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 20, 2022, 2:04pm (UTC)
Arbitrary POST request as victim user from HTML injection in Jupyter notebooks

πŸ‘‰ https://hackerone.com/reports/1409788

πŸ”Ή Severity: High | πŸ’° 8,690 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #joaxcar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 20, 2022, 2:32pm (UTC)
πŸ‘2
Clickjacking at app.lemlist.com

πŸ‘‰ https://hackerone.com/reports/1574017

πŸ”Ή Severity: High
πŸ”Ή Reported To: lemlist
πŸ”Ή Reported By: #ondermedia
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 20, 2022, 3:04pm (UTC)
πŸ‘1
Possible Domain Takeover on AWS Instance.

πŸ‘‰ https://hackerone.com/reports/1390782

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Rocket.Chat
πŸ”Ή Reported By: #samuelsiv
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 22, 2022, 8:18pm (UTC)
πŸ‘1
Email Verification Bypass by bruteforcing when setting up 2FA

πŸ‘‰ https://hackerone.com/reports/1394984

πŸ”Ή Severity: Low | πŸ’° 150 USD
πŸ”Ή Reported To: Evernote
πŸ”Ή Reported By: #cyberworlcload
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 22, 2022, 9:41pm (UTC)
[Java]: Flow sources and steps for JMS and RabbitMQ

πŸ‘‰ https://hackerone.com/reports/1579235

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #not_specified
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 23, 2022, 8:45pm (UTC)
[python]: Zip Slip Vulnerability

πŸ‘‰ https://hackerone.com/reports/1572496

πŸ”Ή Severity: Low | πŸ’° 1,000 USD
πŸ”Ή Reported To: GitHub Security Lab
πŸ”Ή Reported By: #farid_hunter
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 23, 2022, 8:46pm (UTC)
❀2
Stored XSS in photos_user_map.gne

πŸ‘‰ https://hackerone.com/reports/1534636

πŸ”Ή Severity: High | πŸ’° 3,263 USD
πŸ”Ή Reported To: Flickr
πŸ”Ή Reported By: #keer0k
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 23, 2022, 11:21pm (UTC)
Open redirect bypass

πŸ‘‰ https://hackerone.com/reports/1513031

πŸ”Ή Severity: Low | πŸ’° 300 USD
πŸ”Ή Reported To: Flickr
πŸ”Ή Reported By: #xlord91
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: May 23, 2022, 11:23pm (UTC)