Bugpoint – Telegram
Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣

Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Stored-XSS in merge requests

👉 https://hackerone.com/reports/1261148

🔹 Severity: Medium
🔹 Reported To: GitLab
🔹 Reported By: #tester12rtg
🔹 State: ⚪️ Informative
🔹 Disclosed: July 19, 2021, 7:03pm (UTC)
Multiple server ssh usernames leaked in your github repository

👉 https://hackerone.com/reports/1265225

🔹 Severity: Medium
🔹 Reported To: Ian Dunn
🔹 Reported By: #praalsanthpro
🔹 State: 🔴 N/A
🔹 Disclosed: July 19, 2021, 7:37pm (UTC)
CVE-2021-22922: Wrong content via metalink not discarded

👉 https://hackerone.com/reports/1213175

🔹 Severity: Medium | 💰 700 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:28pm (UTC)
CVE-2021-22923: Metalink download sends credentials

👉 https://hackerone.com/reports/1213181

🔹 Severity: Medium | 💰 700 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:28pm (UTC)
CVE-2021-22926: CURLOPT_SSLCERT mixup with Secure Transport

👉 https://hackerone.com/reports/1234760

🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:29pm (UTC)
CVE-2021-22924: Bad connection reuse due to flawed path name checks

👉 https://hackerone.com/reports/1223565

🔹 Severity: High | 💰 1,200 USD
🔹 Reported To: curl
🔹 Reported By: #nyymi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 4:30pm (UTC)
Broken Authentication and Session Management lead to take over account

👉 https://hackerone.com/reports/1271710

🔹 Severity: High
🔹 Reported To: Phabricator
🔹 Reported By: #thund3r17
🔹 State: 🔴 N/A
🔹 Disclosed: July 21, 2021, 4:32pm (UTC)
Exfiltrating a victim's exact location (to within 5m)

👉 https://hackerone.com/reports/1234406

🔹 Severity: High | 💰 2,000 USD
🔹 Reported To: Bumble
🔹 Reported By: #robertheaton
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 6:41pm (UTC)
CVE-2021-22925: TELNET stack contents disclosure again

👉 https://hackerone.com/reports/1223882

🔹 Severity: Low | 💰 800 USD
🔹 Reported To: curl
🔹 Reported By: #thoger
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 8:41pm (UTC)
pam_ussh does not properly validate the SSH certificate authority

👉 https://hackerone.com/reports/1177356

🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Uber
🔹 Reported By: #penguinsaretasty
🔹 State: 🟢 Resolved
🔹 Disclosed: July 21, 2021, 9:19pm (UTC)
Enumerate all the class codes via google dorking

👉 https://hackerone.com/reports/1210043

🔹 Severity: High
🔹 Reported To: Khan Academy
🔹 Reported By: #renganathan
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 1:44am (UTC)
Unauthorized Access To Admin panel

👉 https://hackerone.com/reports/1219681

🔹 Severity: No Rating
🔹 Reported To: Mail.ru
🔹 Reported By: #01alsanosi
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 12:33pm (UTC)
Bypassing SOP with XSS on account.my.games leading to steal CSRF token and user information

👉 https://hackerone.com/reports/1215053

🔹 Severity: Medium | 💰 200 USD
🔹 Reported To: Mail.ru
🔹 Reported By: #sec_zone64
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 2:41pm (UTC)
[tanks.mail.ru] SSRF + Кража cookie

👉 https://hackerone.com/reports/1166943

🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: Mail.ru
🔹 Reported By: #alexeysergeevich
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 3:07pm (UTC)
[Lark Android] Vulnerability in exported activity WebView

👉 https://hackerone.com/reports/694053

🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Lark Technologies
🔹 Reported By: #shell_c0de
🔹 State: 🟢 Resolved
🔹 Disclosed: July 22, 2021, 10:28pm (UTC)
Account takeover through multistage CSRF at https://autochoice.fas.gsa.gov/AutoChoice/changeQAOktaAnswer and ../AutoChoice/changePwOktaAnswer

👉 https://hackerone.com/reports/1208453

🔹 Severity: Medium
🔹 Reported To: U.S. General Services Administration
🔹 Reported By: #rajeshpatil
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 2:07am (UTC)
Canonical Snapcraft vulnerable to remote code execution under certain conditions

👉 https://hackerone.com/reports/1073202

🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: The Internet
🔹 Reported By: #itszn
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 3:13am (UTC)
Fragmentation and Aggregation Flaws in Wi-Fi

👉 https://hackerone.com/reports/1238470

🔹 Severity: No Rating | 💰 750 USD
🔹 Reported To: The Internet
🔹 Reported By: #vanhoefm
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 3:59am (UTC)
tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c

👉 https://hackerone.com/reports/831353

🔹 Severity: Medium | 💰 500 USD
🔹 Reported To: Data Processing (IBB)
🔹 Reported By: #dotsecurity
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 5:14am (UTC)
[CVE-2020-27194] Linux kernel: eBPF verifier bug in `or` binary operation tracking function leads to LPE

👉 https://hackerone.com/reports/1010340

🔹 Severity: High | 💰 750 USD
🔹 Reported To: The Internet
🔹 Reported By: #simonscannell
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 7:55am (UTC)
Uncovering file quarantine and UX security issues in macOS apps ( .terminal, .fileloc and .url)

👉 https://hackerone.com/reports/944025

🔹 Severity: No Rating | 💰 750 USD
🔹 Reported To: The Internet
🔹 Reported By: #metnew
🔹 State: 🟢 Resolved
🔹 Disclosed: July 23, 2021, 12:07pm (UTC)