Stored XSS in custom emoji
👉 https://hackerone.com/reports/1198517
🔹 Severity: High | 💰 3,000 USD
🔹 Reported To: GitLab
🔹 Reported By: #ooooooo_q
🔹 State: 🟢 Resolved
🔹 Disclosed: July 19, 2021, 1:06pm (UTC)
👉 https://hackerone.com/reports/1198517
🔹 Severity: High | 💰 3,000 USD
🔹 Reported To: GitLab
🔹 Reported By: #ooooooo_q
🔹 State: 🟢 Resolved
🔹 Disclosed: July 19, 2021, 1:06pm (UTC)
Reflected XSS via "Error" parameter on https://admin.acronis.com/admin/su/
👉 https://hackerone.com/reports/970878
🔹 Severity: Medium | 💰 50 USD
🔹 Reported To: Acronis
🔹 Reported By: #samincube
🔹 State: 🟢 Resolved
🔹 Disclosed: July 19, 2021, 5:59pm (UTC)
👉 https://hackerone.com/reports/970878
🔹 Severity: Medium | 💰 50 USD
🔹 Reported To: Acronis
🔹 Reported By: #samincube
🔹 State: 🟢 Resolved
🔹 Disclosed: July 19, 2021, 5:59pm (UTC)
Stored-XSS in merge requests
👉 https://hackerone.com/reports/1261148
🔹 Severity: Medium
🔹 Reported To: GitLab
🔹 Reported By: #tester12rtg
🔹 State: ⚪️ Informative
🔹 Disclosed: July 19, 2021, 7:03pm (UTC)
👉 https://hackerone.com/reports/1261148
🔹 Severity: Medium
🔹 Reported To: GitLab
🔹 Reported By: #tester12rtg
🔹 State: ⚪️ Informative
🔹 Disclosed: July 19, 2021, 7:03pm (UTC)
Multiple server ssh usernames leaked in your github repository
👉 https://hackerone.com/reports/1265225
🔹 Severity: Medium
🔹 Reported To: Ian Dunn
🔹 Reported By: #praalsanthpro
🔹 State: 🔴 N/A
🔹 Disclosed: July 19, 2021, 7:37pm (UTC)
👉 https://hackerone.com/reports/1265225
🔹 Severity: Medium
🔹 Reported To: Ian Dunn
🔹 Reported By: #praalsanthpro
🔹 State: 🔴 N/A
🔹 Disclosed: July 19, 2021, 7:37pm (UTC)
CVE-2021-22922: Wrong content via metalink not discarded
👉 https://hackerone.com/reports/1213175
🔹 Severity: Medium | 💰 700 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:28pm (UTC)
👉 https://hackerone.com/reports/1213175
🔹 Severity: Medium | 💰 700 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:28pm (UTC)
CVE-2021-22923: Metalink download sends credentials
👉 https://hackerone.com/reports/1213181
🔹 Severity: Medium | 💰 700 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:28pm (UTC)
👉 https://hackerone.com/reports/1213181
🔹 Severity: Medium | 💰 700 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:28pm (UTC)
CVE-2021-22926: CURLOPT_SSLCERT mixup with Secure Transport
👉 https://hackerone.com/reports/1234760
🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:29pm (UTC)
👉 https://hackerone.com/reports/1234760
🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:29pm (UTC)
CVE-2021-22924: Bad connection reuse due to flawed path name checks
👉 https://hackerone.com/reports/1223565
🔹 Severity: High | 💰 1,200 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:30pm (UTC)
👉 https://hackerone.com/reports/1223565
🔹 Severity: High | 💰 1,200 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:30pm (UTC)
Broken Authentication and Session Management lead to take over account
👉 https://hackerone.com/reports/1271710
🔹 Severity: High
🔹 Reported To: Phabricator
🔹 Reported By: #thund3r17
🔹 State: 🔴 N/A
🔹 Disclosed: July 21, 2021, 4:32pm (UTC)
👉 https://hackerone.com/reports/1271710
🔹 Severity: High
🔹 Reported To: Phabricator
🔹 Reported By: #thund3r17
🔹 State: 🔴 N/A
🔹 Disclosed: July 21, 2021, 4:32pm (UTC)
Exfiltrating a victim's exact location (to within 5m)
👉 https://hackerone.com/reports/1234406
🔹 Severity: High | 💰 2,000 USD
🔹 Reported To: Bumble
🔹 Reported By: #robertheaton
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 6:41pm (UTC)
👉 https://hackerone.com/reports/1234406
🔹 Severity: High | 💰 2,000 USD
🔹 Reported To: Bumble
🔹 Reported By: #robertheaton
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 6:41pm (UTC)
CVE-2021-22925: TELNET stack contents disclosure again
👉 https://hackerone.com/reports/1223882
🔹 Severity: Low | 💰 800 USD
🔹 Reported To: curl
🔹 Reported By: #thoger
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 8:41pm (UTC)
👉 https://hackerone.com/reports/1223882
🔹 Severity: Low | 💰 800 USD
🔹 Reported To: curl
🔹 Reported By: #thoger
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 8:41pm (UTC)
pam_ussh does not properly validate the SSH certificate authority
👉 https://hackerone.com/reports/1177356
🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Uber
🔹 Reported By: #penguinsaretasty
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 9:19pm (UTC)
👉 https://hackerone.com/reports/1177356
🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Uber
🔹 Reported By: #penguinsaretasty
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 9:19pm (UTC)
Enumerate all the class codes via google dorking
👉 https://hackerone.com/reports/1210043
🔹 Severity: High
🔹 Reported To: Khan Academy
🔹 Reported By: #renganathan
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 1:44am (UTC)
👉 https://hackerone.com/reports/1210043
🔹 Severity: High
🔹 Reported To: Khan Academy
🔹 Reported By: #renganathan
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 1:44am (UTC)
Unauthorized Access To Admin panel
👉 https://hackerone.com/reports/1219681
🔹 Severity: No Rating
🔹 Reported To: Mail.ru
🔹 Reported By: #01alsanosi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 12:33pm (UTC)
👉 https://hackerone.com/reports/1219681
🔹 Severity: No Rating
🔹 Reported To: Mail.ru
🔹 Reported By: #01alsanosi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 12:33pm (UTC)
Bypassing SOP with XSS on account.my.games leading to steal CSRF token and user information
👉 https://hackerone.com/reports/1215053
🔹 Severity: Medium | 💰 200 USD
🔹 Reported To: Mail.ru
🔹 Reported By: #sec_zone64
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 2:41pm (UTC)
👉 https://hackerone.com/reports/1215053
🔹 Severity: Medium | 💰 200 USD
🔹 Reported To: Mail.ru
🔹 Reported By: #sec_zone64
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 2:41pm (UTC)
[tanks.mail.ru] SSRF + Кража cookie
👉 https://hackerone.com/reports/1166943
🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: Mail.ru
🔹 Reported By: #alexeysergeevich
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 3:07pm (UTC)
👉 https://hackerone.com/reports/1166943
🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: Mail.ru
🔹 Reported By: #alexeysergeevich
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 3:07pm (UTC)
[Lark Android] Vulnerability in exported activity WebView
👉 https://hackerone.com/reports/694053
🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Lark Technologies
🔹 Reported By: #shell_c0de
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 10:28pm (UTC)
👉 https://hackerone.com/reports/694053
🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Lark Technologies
🔹 Reported By: #shell_c0de
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 10:28pm (UTC)
Account takeover through multistage CSRF at https://autochoice.fas.gsa.gov/AutoChoice/changeQAOktaAnswer and ../AutoChoice/changePwOktaAnswer
👉 https://hackerone.com/reports/1208453
🔹 Severity: Medium
🔹 Reported To: U.S. General Services Administration
🔹 Reported By: #rajeshpatil
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 2:07am (UTC)
👉 https://hackerone.com/reports/1208453
🔹 Severity: Medium
🔹 Reported To: U.S. General Services Administration
🔹 Reported By: #rajeshpatil
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 2:07am (UTC)
Canonical Snapcraft vulnerable to remote code execution under certain conditions
👉 https://hackerone.com/reports/1073202
🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: The Internet
🔹 Reported By: #itszn
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 3:13am (UTC)
👉 https://hackerone.com/reports/1073202
🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: The Internet
🔹 Reported By: #itszn
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 3:13am (UTC)
Fragmentation and Aggregation Flaws in Wi-Fi
👉 https://hackerone.com/reports/1238470
🔹 Severity: No Rating | 💰 750 USD
🔹 Reported To: The Internet
🔹 Reported By: #vanhoefm
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 3:59am (UTC)
👉 https://hackerone.com/reports/1238470
🔹 Severity: No Rating | 💰 750 USD
🔹 Reported To: The Internet
🔹 Reported By: #vanhoefm
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 3:59am (UTC)
tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c
👉 https://hackerone.com/reports/831353
🔹 Severity: Medium | 💰 500 USD
🔹 Reported To: Data Processing (IBB)
🔹 Reported By: #dotsecurity
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 5:14am (UTC)
👉 https://hackerone.com/reports/831353
🔹 Severity: Medium | 💰 500 USD
🔹 Reported To: Data Processing (IBB)
🔹 Reported By: #dotsecurity
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 5:14am (UTC)