Bugpoint – Telegram
Bugpoint
1.05K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣

Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Bypassing Rate limit for forgot password by using different ip addresses

👉 https://hackerone.com/reports/889246

🔹 Severity: Low
🔹 Reported To: Zivver
🔹 Reported By: #dhirenkumar8280
🔹 State: 🟢 Resolved
🔹 Disclosed: September 15, 2021, 7:36pm (UTC)
[3] Bypassing IP Based Rate Limit Blocking leads to rate limit bypass in Courier Login Panel

👉 https://hackerone.com/reports/1320976

🔹 Severity: No Rating
🔹 Reported To: Courier
🔹 Reported By: #bugera
🔹 State: 🟢 Resolved
🔹 Disclosed: September 16, 2021, 5:31pm (UTC)
Session Fixiation allow attacker to create new evil workspace without being logged in [ Insecure Session management ]

👉 https://hackerone.com/reports/1329434

🔹 Severity: Medium
🔹 Reported To: Courier
🔹 Reported By: #bugera
🔹 State: 🟢 Resolved
🔹 Disclosed: September 16, 2021, 5:32pm (UTC)
SSRF to AWS file read

👉 https://hackerone.com/reports/978823

🔹 Severity: Critical
🔹 Reported To: Topcoder
🔹 Reported By: #3viltwin
🔹 State: 🟢 Resolved
🔹 Disclosed: September 16, 2021, 10:30pm (UTC)
Account takeover due to misconfiguration

👉 https://hackerone.com/reports/1114347

🔹 Severity: Low | 💰 150 USD
🔹 Reported To: Mattermost
🔹 Reported By: #akashhamal0x01
🔹 State: 🟢 Resolved
🔹 Disclosed: September 17, 2021, 5:19am (UTC)
Subdomain takeover of fr1.vpn.zomans.com

👉 https://hackerone.com/reports/1182864

🔹 Severity: Medium | 💰 350 USD
🔹 Reported To: Zomato
🔹 Reported By: #ian
🔹 State: 🟢 Resolved
🔹 Disclosed: September 17, 2021, 5:50am (UTC)
Subdomain Takeover due to ████████ NS records at us-east4.37signals.com

👉 https://hackerone.com/reports/1342422

🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: Basecamp
🔹 Reported By: #nagli
🔹 State: 🟢 Resolved
🔹 Disclosed: September 17, 2021, 9:45pm (UTC)
Text injection or content spoofing on forbiden page

👉 https://hackerone.com/reports/1310925

🔹 Severity: Low | 💰 100 USD
🔹 Reported To: XVIDEOS
🔹 Reported By: #alone_test
🔹 State: 🟢 Resolved
🔹 Disclosed: September 19, 2021, 4:28pm (UTC)
Hacker can bypass minimum bounty amount restrictions in "invitation preferences" setting via UpdateInvitationPreferencesMutation GraphQL operation

👉 https://hackerone.com/reports/981036

🔹 Severity: Low
🔹 Reported To: HackerOne
🔹 Reported By: #frozensolid
🔹 State: ⚪️ Informative
🔹 Disclosed: September 20, 2021, 1:20pm (UTC)
New experimental query: Clipboard-based XSS

👉 https://hackerone.com/reports/1345484

🔹 Severity: High
🔹 Reported To: GitHub Security Lab
🔹 Reported By: #not_specified
🔹 State: 🟢 Resolved
🔹 Disclosed: September 20, 2021, 10:00pm (UTC)
ihsinme: Add query for CWE-758 Reliance on Undefined, Unspecified, or Implementation-Defined Behavior

👉 https://hackerone.com/reports/1345483

🔹 Severity: Medium
🔹 Reported To: GitHub Security Lab
🔹 Reported By: #not_specified
🔹 State: 🟢 Resolved
🔹 Disclosed: September 20, 2021, 10:00pm (UTC)
Open Redirect through POST Request in OAuth

👉 https://hackerone.com/reports/1129761

🔹 Severity: Low | 💰 50 USD
🔹 Reported To: Moneybird
🔹 Reported By: #bugera
🔹 State: 🟢 Resolved
🔹 Disclosed: September 21, 2021, 2:29pm (UTC)
IDOR in https://moneybird.com/user/accountant_company/edit(change company name)

👉 https://hackerone.com/reports/726163

🔹 Severity: Low | 💰 50 USD
🔹 Reported To: Moneybird
🔹 Reported By: #t3chnophil3
🔹 State: 🟢 Resolved
🔹 Disclosed: September 21, 2021, 2:31pm (UTC)
Access to microtransaction sales data for lots of apps from 2014 to present at /valvefinance/sanity/

👉 https://hackerone.com/reports/975212

🔹 Severity: Critical | 💰 9,000 USD
🔹 Reported To: Valve
🔹 Reported By: #njbooher
🔹 State: 🟢 Resolved
🔹 Disclosed: September 21, 2021, 9:41pm (UTC)
Big Picture web browser leaks login cookies and discloses sensitive information (may lead to account takeover)

👉 https://hackerone.com/reports/1079561

🔹 Severity: High | 💰 2,500 USD
🔹 Reported To: Valve
🔹 Reported By: #bugstar
🔹 State: 🟢 Resolved
🔹 Disclosed: September 21, 2021, 9:42pm (UTC)
Privilege Escalation vulnerability in steam's Remote Play feature leads to arbitrary kernel-mode driver installation

👉 https://hackerone.com/reports/852091

🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: Valve
🔹 Reported By: #hydraskyteam
🔹 State: 🟢 Resolved
🔹 Disclosed: September 21, 2021, 9:55pm (UTC)
Information disclosure

👉 https://hackerone.com/reports/1347249

🔹 Severity: High
🔹 Reported To: Brave Software
🔹 Reported By: #kkarfalcon
🔹 State: 🔴 N/A
🔹 Disclosed: September 21, 2021, 11:35pm (UTC)
HTML Injection in Email

👉 https://hackerone.com/reports/1248585

🔹 Severity: Low
🔹 Reported To: Engel & Völkers Technology GmbH
🔹 Reported By: #chaitanya_024
🔹 State: 🟢 Resolved
🔹 Disclosed: September 22, 2021, 8:30am (UTC)
Race condition allows to send multiple times feedback for the hacker

👉 https://hackerone.com/reports/1132171

🔹 Severity: Low
🔹 Reported To: HackerOne
🔹 Reported By: #muon4
🔹 State: 🟢 Resolved
🔹 Disclosed: September 22, 2021, 7:21pm (UTC)
Used email confirmation link reveals the email address which is tied to it

👉 https://hackerone.com/reports/1128358

🔹 Severity: No Rating
🔹 Reported To: HackerOne
🔹 Reported By: #muon4
🔹 State: 🟢 Resolved
🔹 Disclosed: September 22, 2021, 7:24pm (UTC)
CSV injection in the credentials export

👉 https://hackerone.com/reports/1131887

🔹 Severity: No Rating
🔹 Reported To: HackerOne
🔹 Reported By: #muon4
🔹 State: 🟢 Resolved
🔹 Disclosed: September 22, 2021, 7:33pm (UTC)