Bugpoint – Telegram
Bugpoint
1.06K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣

Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
Password reset token leak via "Host header" on third party website

👉 https://hackerone.com/reports/1092831

🔹 Severity: No Rating
🔹 Reported To: Shopify
🔹 Reported By: #danishalkatiri
🔹 State: 🟢 Resolved
🔹 Disclosed: February 10, 2022, 7:41pm (UTC)
Bypass For #997350 your-store.myshopify.com preview link is leak on third party website Via Online Store

👉 https://hackerone.com/reports/1015283

🔹 Severity: Low | 💰 500 USD
🔹 Reported To: Shopify
🔹 Reported By: #danishalkatiri
🔹 State: 🟢 Resolved
🔹 Disclosed: February 10, 2022, 7:42pm (UTC)
[h1-2102] Information disclosure - ShopifyPlus add user displays existing Shopify ID fullname

👉 https://hackerone.com/reports/1083922

🔹 Severity: Medium | 💰 1,900 USD
🔹 Reported To: Shopify
🔹 Reported By: #francisbeaudoin
🔹 State: 🟢 Resolved
🔹 Disclosed: February 10, 2022, 7:45pm (UTC)
🔥1
Information Exposure Through Directory Listing vulnerability

👉 https://hackerone.com/reports/1476709

🔹 Severity: Medium
🔹 Reported To: Nextcloud
🔹 Reported By: #technorat
🔹 State: ⚪️ Informative
🔹 Disclosed: February 11, 2022, 8:05am (UTC)
Able to detect if a user is FetLife supporter although this user hides their support badge in fetlife.com/conversations/{id} JSON response

👉 https://hackerone.com/reports/1423704

🔹 Severity: Medium | 💰 100 USD
🔹 Reported To: FetLife
🔹 Reported By: #trieulieuf9
🔹 State: 🟢 Resolved
🔹 Disclosed: February 11, 2022, 11:43am (UTC)
🤔1
Discoverability by phone number/email restriction bypass

👉 https://hackerone.com/reports/1439026

🔹 Severity: High | 💰 5,040 USD
🔹 Reported To: Twitter
🔹 Reported By: #zhirinovskiy
🔹 State: 🟢 Resolved
🔹 Disclosed: February 11, 2022, 5:00pm (UTC)
🔥1👏1🎉1
Blind XSS on Twitter's internal Jira panel at ████ allows exfiltration of hackers reports and other sensitive data

👉 https://hackerone.com/reports/1369674

🔹 Severity: Critical | 💰 5,040 USD
🔹 Reported To: Twitter
🔹 Reported By: #iambouali
🔹 State: 🟢 Resolved
🔹 Disclosed: February 12, 2022, 6:32am (UTC)
🔥4👍2
[h1-2102] Break permissions waterfall

👉 https://hackerone.com/reports/1088159

🔹 Severity: Low | 💰 500 USD
🔹 Reported To: Shopify
🔹 Reported By: #hogarth45
🔹 State: 🟢 Resolved
🔹 Disclosed: February 12, 2022, 8:48pm (UTC)
Widespread CSRF on authenticated POST endpoints

👉 https://hackerone.com/reports/1309435

🔹 Severity: High
🔹 Reported To: UPchieve
🔹 Reported By: #zeyu2001
🔹 State: 🟢 Resolved
🔹 Disclosed: February 13, 2022, 10:38am (UTC)
[CVE-2020-3452] Unauthenticated file read in Cisco ASA

👉 https://hackerone.com/reports/1415825

🔹 Severity: Critical
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #ghostxsec
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:13pm (UTC)
RXSS ON https://██████████

👉 https://hackerone.com/reports/1244145

🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #iam_a_jinchuriki
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:14pm (UTC)
Unauthorized access to PII leads to MASS account Takeover

👉 https://hackerone.com/reports/1061736

🔹 Severity: Critical
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #takester
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:15pm (UTC)
default ████ creds on https://████████

👉 https://hackerone.com/reports/711662

🔹 Severity: Critical
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #pirateducky
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:17pm (UTC)
(CORS) Cross-origin resource sharing misconfiguration on https://█████████

👉 https://hackerone.com/reports/995144

🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #fiveguyslover
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:18pm (UTC)
Reflected XSS at https://██████/██████████ via "████████" parameter

👉 https://hackerone.com/reports/1457413

🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #pelegn
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:19pm (UTC)
Reflected XSS at https://██████/██████ via "██████" parameter

👉 https://hackerone.com/reports/1457444

🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #pelegn
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:20pm (UTC)
Reflected XSS at https://██████████/████████ via "███████" parameter

👉 https://hackerone.com/reports/1457493

🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #pelegn
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:20pm (UTC)
Reflected XSS at https://█████ via "██████████" parameter

👉 https://hackerone.com/reports/1457546

🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #pelegn
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:21pm (UTC)
Reflected XSS at https://█████████ via "███" parameter

👉 https://hackerone.com/reports/1457277

🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #pelegn
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:22pm (UTC)
XSS trigger via HTML Iframe injection in ( https://██████████ ) due to unfiltered HTML tags

👉 https://hackerone.com/reports/1200770

🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #rozerx00
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:23pm (UTC)
EC2 subdomain takeover at http://████████/

👉 https://hackerone.com/reports/1296366

🔹 Severity: Critical
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #dreyand72
🔹 State: 🟢 Resolved
🔹 Disclosed: February 14, 2022, 9:24pm (UTC)