Bypass Rate Limits on app.snapchat.com API Endpoint via X-Forwarded-For Header
👉 https://hackerone.com/reports/727487
🔹 Severity: Medium | 💰 1,250 USD
🔹 Reported To: Snapchat
🔹 Reported By: #sicarius
🔹 State: 🟢 Resolved
🔹 Disclosed: August 4, 2021, 9:18pm (UTC)
👉 https://hackerone.com/reports/727487
🔹 Severity: Medium | 💰 1,250 USD
🔹 Reported To: Snapchat
🔹 Reported By: #sicarius
🔹 State: 🟢 Resolved
🔹 Disclosed: August 4, 2021, 9:18pm (UTC)
Internal Gitlab Ticket Disclosure via External Slack Channels
👉 https://hackerone.com/reports/1273292
🔹 Severity: High | 💰 7,500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #none_of_the_above
🔹 State: 🟢 Resolved
🔹 Disclosed: August 4, 2021, 11:48pm (UTC)
👉 https://hackerone.com/reports/1273292
🔹 Severity: High | 💰 7,500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #none_of_the_above
🔹 State: 🟢 Resolved
🔹 Disclosed: August 4, 2021, 11:48pm (UTC)
Acronis True Image (Windows) does not validate server certificate on a TLS connection
👉 https://hackerone.com/reports/1056144
🔹 Severity: High | 💰 500 USD
🔹 Reported To: Acronis
🔹 Reported By: #aapo
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 12:53pm (UTC)
👉 https://hackerone.com/reports/1056144
🔹 Severity: High | 💰 500 USD
🔹 Reported To: Acronis
🔹 Reported By: #aapo
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 12:53pm (UTC)
Mishandling of hackerone clear background checks resulting in disclosure of other hacker's information
👉 https://hackerone.com/reports/1240162
🔹 Severity: Medium
🔹 Reported To: HackerOne
🔹 Reported By: #frozensolid
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 3:24pm (UTC)
👉 https://hackerone.com/reports/1240162
🔹 Severity: Medium
🔹 Reported To: HackerOne
🔹 Reported By: #frozensolid
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 3:24pm (UTC)
Private program disclosure through notifications
👉 https://hackerone.com/reports/1234746
🔹 Severity: Low | 💰 500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #sunil_yedla
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 6:42pm (UTC)
👉 https://hackerone.com/reports/1234746
🔹 Severity: Low | 💰 500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #sunil_yedla
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 6:42pm (UTC)
Partial report contents leakage - via HTTP/2 concurrent stream handling
👉 https://hackerone.com/reports/493176
🔹 Severity: Medium | 💰 2,500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #tomvg
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 8:07pm (UTC)
👉 https://hackerone.com/reports/493176
🔹 Severity: Medium | 💰 2,500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #tomvg
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 8:07pm (UTC)
CVE-2020-3452 - unauthenticated file read on anyconnect.routematch.com
👉 https://hackerone.com/reports/1257100
🔹 Severity: Medium | 💰 500 USD
🔹 Reported To: Uber
🔹 Reported By: #0xprial
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 8:15pm (UTC)
👉 https://hackerone.com/reports/1257100
🔹 Severity: Medium | 💰 500 USD
🔹 Reported To: Uber
🔹 Reported By: #0xprial
🔹 State: 🟢 Resolved
🔹 Disclosed: August 5, 2021, 8:15pm (UTC)
Mattermost Server OAuth Flow Cross-Site Scripting
👉 https://hackerone.com/reports/1216203
🔹 Severity: High | 💰 900 USD
🔹 Reported To: Mattermost
🔹 Reported By: #shielder
🔹 State: 🟢 Resolved
🔹 Disclosed: August 6, 2021, 2:01pm (UTC)
👉 https://hackerone.com/reports/1216203
🔹 Severity: High | 💰 900 USD
🔹 Reported To: Mattermost
🔹 Reported By: #shielder
🔹 State: 🟢 Resolved
🔹 Disclosed: August 6, 2021, 2:01pm (UTC)
Loading YAML in Java client can lead to command execution
👉 https://hackerone.com/reports/1167773
🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Kubernetes
🔹 Reported By: #j0v
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 12:41pm (UTC)
👉 https://hackerone.com/reports/1167773
🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Kubernetes
🔹 Reported By: #j0v
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 12:41pm (UTC)
Virtual Data Room / Hide download on collabora is easy to bypass
👉 https://hackerone.com/reports/1194606
🔹 Severity: High | 💰 150 USD
🔹 Reported To: Nextcloud
🔹 Reported By: #rtod
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 2:28pm (UTC)
👉 https://hackerone.com/reports/1194606
🔹 Severity: High | 💰 150 USD
🔹 Reported To: Nextcloud
🔹 Reported By: #rtod
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 2:28pm (UTC)
Webauthn tokens are not removed on user deletion
👉 https://hackerone.com/reports/1202590
🔹 Severity: Medium
🔹 Reported To: Nextcloud
🔹 Reported By: #rtod
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 2:28pm (UTC)
👉 https://hackerone.com/reports/1202590
🔹 Severity: Medium
🔹 Reported To: Nextcloud
🔹 Reported By: #rtod
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 2:28pm (UTC)
Local privilege escalation via insecure MSI file
👉 https://hackerone.com/reports/1071832
🔹 Severity: High | 💰 250 USD
🔹 Reported To: Acronis
🔹 Reported By: #twvyy3vyaw8k
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 7:11pm (UTC)
👉 https://hackerone.com/reports/1071832
🔹 Severity: High | 💰 250 USD
🔹 Reported To: Acronis
🔹 Reported By: #twvyy3vyaw8k
🔹 State: 🟢 Resolved
🔹 Disclosed: August 7, 2021, 7:11pm (UTC)
PII data Leakage through hackerone reports
👉 https://hackerone.com/reports/1256371
🔹 Severity: Low
🔹 Reported To: HackerOne
🔹 Reported By: #iamr0000t
🔹 State: 🟢 Resolved
🔹 Disclosed: August 9, 2021, 8:03pm (UTC)
👉 https://hackerone.com/reports/1256371
🔹 Severity: Low
🔹 Reported To: HackerOne
🔹 Reported By: #iamr0000t
🔹 State: 🟢 Resolved
🔹 Disclosed: August 9, 2021, 8:03pm (UTC)
Tab nabbing in Hackerone inbox.
👉 https://hackerone.com/reports/1145563
🔹 Severity: Low | 💰 500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #adhamsadaqah
🔹 State: 🟢 Resolved
🔹 Disclosed: August 9, 2021, 8:20pm (UTC)
👉 https://hackerone.com/reports/1145563
🔹 Severity: Low | 💰 500 USD
🔹 Reported To: HackerOne
🔹 Reported By: #adhamsadaqah
🔹 State: 🟢 Resolved
🔹 Disclosed: August 9, 2021, 8:20pm (UTC)
Password reset link not expiring after changing password in settings
👉 https://hackerone.com/reports/1288898
🔹 Severity: Low | 💰 250 USD
🔹 Reported To: Basecamp
🔹 Reported By: #blackbibin
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 6:58am (UTC)
👉 https://hackerone.com/reports/1288898
🔹 Severity: Low | 💰 250 USD
🔹 Reported To: Basecamp
🔹 Reported By: #blackbibin
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 6:58am (UTC)
Insecure Bundler configuration fetching internal Gems (okra) from Rubygems.org
👉 https://hackerone.com/reports/1104874
🔹 Severity: High | 💰 5,000 USD
🔹 Reported To: Basecamp
🔹 Reported By: #zofrex
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 7:12am (UTC)
👉 https://hackerone.com/reports/1104874
🔹 Severity: High | 💰 5,000 USD
🔹 Reported To: Basecamp
🔹 Reported By: #zofrex
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 7:12am (UTC)
Login session not expire
👉 https://hackerone.com/reports/1294231
🔹 Severity: Low | 💰 100 USD
🔹 Reported To: Basecamp
🔹 Reported By: #blackbibin
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 8:08am (UTC)
👉 https://hackerone.com/reports/1294231
🔹 Severity: Low | 💰 100 USD
🔹 Reported To: Basecamp
🔹 Reported By: #blackbibin
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 8:08am (UTC)
Password reset token leak on third party website via Referer header
👉 https://hackerone.com/reports/1177287
🔹 Severity: Medium
🔹 Reported To: UPchieve
🔹 Reported By: #n1had
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 3:20pm (UTC)
👉 https://hackerone.com/reports/1177287
🔹 Severity: Medium
🔹 Reported To: UPchieve
🔹 Reported By: #n1had
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 3:20pm (UTC)
Acronis True Image 2021 (windows) does not validate server hostname on a login TLS connection
👉 https://hackerone.com/reports/1070533
🔹 Severity: High | 💰 250 USD
🔹 Reported To: Acronis
🔹 Reported By: #aapo
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 6:02pm (UTC)
👉 https://hackerone.com/reports/1070533
🔹 Severity: High | 💰 250 USD
🔹 Reported To: Acronis
🔹 Reported By: #aapo
🔹 State: 🟢 Resolved
🔹 Disclosed: August 10, 2021, 6:02pm (UTC)
Improper authorization on `/api/as/v1/credentials/` for Dev Role User with Limited Engine Access
👉 https://hackerone.com/reports/1218680
🔹 Severity: High | 💰 3,800 USD
🔹 Reported To: Elastic
🔹 Reported By: #superman85
🔹 State: 🟢 Resolved
🔹 Disclosed: August 3, 2021, 5:12pm (UTC)
👉 https://hackerone.com/reports/1218680
🔹 Severity: High | 💰 3,800 USD
🔹 Reported To: Elastic
🔹 Reported By: #superman85
🔹 State: 🟢 Resolved
🔹 Disclosed: August 3, 2021, 5:12pm (UTC)
[Swiftype] - Stored XSS via document field `url` triggers on `https://app.swiftype.com/engines/<engine>/document_types/<type>/documents/<id>`
👉 https://hackerone.com/reports/1245787
🔹 Severity: High | 💰 3,200 USD
🔹 Reported To: Elastic
🔹 Reported By: #superman85
🔹 State: 🟢 Resolved
🔹 Disclosed: August 3, 2021, 5:12pm (UTC)
👉 https://hackerone.com/reports/1245787
🔹 Severity: High | 💰 3,200 USD
🔹 Reported To: Elastic
🔹 Reported By: #superman85
🔹 State: 🟢 Resolved
🔹 Disclosed: August 3, 2021, 5:12pm (UTC)