SSRF due to CVE-2021-27905 in www.████████
👉 https://hackerone.com/reports/1183472
🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #fdeleite
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:00pm (UTC)
👉 https://hackerone.com/reports/1183472
🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #fdeleite
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:00pm (UTC)
Sensitive data exposure via /secure/QueryComponent!Default.jspa endpoint on ████████
👉 https://hackerone.com/reports/1278977
🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #njmulsqb
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:03pm (UTC)
👉 https://hackerone.com/reports/1278977
🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #njmulsqb
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:03pm (UTC)
lfi in filePathDownload parameter via ███████
👉 https://hackerone.com/reports/1542734
🔹 Severity: High
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #exploitmsf
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:04pm (UTC)
👉 https://hackerone.com/reports/1542734
🔹 Severity: High
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #exploitmsf
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:04pm (UTC)
Reflected XSS [███]
👉 https://hackerone.com/reports/1309237
🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #fdeleite
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:05pm (UTC)
👉 https://hackerone.com/reports/1309237
🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #fdeleite
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:05pm (UTC)
Reflected XSS [██████]
👉 https://hackerone.com/reports/1309385
🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #fdeleite
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:06pm (UTC)
👉 https://hackerone.com/reports/1309385
🔹 Severity: Medium
🔹 Reported To: U.S. Dept Of Defense
🔹 Reported By: #fdeleite
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 2:06pm (UTC)
Hardcoded AWS credentials in ███████.msi
👉 https://hackerone.com/reports/1368690
🔹 Severity: Critical
🔹 Reported To: 8x8
🔹 Reported By: #chip_sec
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 5:01pm (UTC)
👉 https://hackerone.com/reports/1368690
🔹 Severity: Critical
🔹 Reported To: 8x8
🔹 Reported By: #chip_sec
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 5:01pm (UTC)
Reflected XSS due to vulnerable version of sockjs
👉 https://hackerone.com/reports/1100326
🔹 Severity: Medium | 💰 250 USD
🔹 Reported To: Automattic
🔹 Reported By: #chip_sec
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 5:38pm (UTC)
👉 https://hackerone.com/reports/1100326
🔹 Severity: Medium | 💰 250 USD
🔹 Reported To: Automattic
🔹 Reported By: #chip_sec
🔹 State: 🟢 Resolved
🔹 Disclosed: April 29, 2022, 5:38pm (UTC)
com.nextcloud.client bypass the protection lock in andoid app v 3.18.1 latest version.
👉 https://hackerone.com/reports/1450368
🔹 Severity: Low | 💰 200 USD
🔹 Reported To: Nextcloud
🔹 Reported By: #dashingjaved
🔹 State: 🟢 Resolved
🔹 Disclosed: April 30, 2022, 11:56am (UTC)
👉 https://hackerone.com/reports/1450368
🔹 Severity: Low | 💰 200 USD
🔹 Reported To: Nextcloud
🔹 Reported By: #dashingjaved
🔹 State: 🟢 Resolved
🔹 Disclosed: April 30, 2022, 11:56am (UTC)
Enumerate class codes via yahoo dork - Can access any course under teacher - Sensitive information leaked
👉 https://hackerone.com/reports/1514356
🔹 Severity: High
🔹 Reported To: Khan Academy
🔹 Reported By: #bughunterpol
🔹 State: 🟢 Resolved
🔹 Disclosed: May 1, 2022, 6:05pm (UTC)
👉 https://hackerone.com/reports/1514356
🔹 Severity: High
🔹 Reported To: Khan Academy
🔹 Reported By: #bughunterpol
🔹 State: 🟢 Resolved
🔹 Disclosed: May 1, 2022, 6:05pm (UTC)
XSS at videostore.mtnonline.com/GL/*.aspx via all parameters
👉 https://hackerone.com/reports/1244731
🔹 Severity: Medium
🔹 Reported To: MTN Group
🔹 Reported By: #homosec
🔹 State: 🟢 Resolved
🔹 Disclosed: May 1, 2022, 9:20pm (UTC)
👉 https://hackerone.com/reports/1244731
🔹 Severity: Medium
🔹 Reported To: MTN Group
🔹 Reported By: #homosec
🔹 State: 🟢 Resolved
🔹 Disclosed: May 1, 2022, 9:20pm (UTC)
XSS at http://nextapps.mtnonline.com/search/suggest/q/{xss payload}
👉 https://hackerone.com/reports/1244722
🔹 Severity: Medium
🔹 Reported To: MTN Group
🔹 Reported By: #homosec
🔹 State: 🟢 Resolved
🔹 Disclosed: May 1, 2022, 9:20pm (UTC)
👉 https://hackerone.com/reports/1244722
🔹 Severity: Medium
🔹 Reported To: MTN Group
🔹 Reported By: #homosec
🔹 State: 🟢 Resolved
🔹 Disclosed: May 1, 2022, 9:20pm (UTC)
Self-DoS due to template injection via email field in password reset form on access.acronis.com
👉 https://hackerone.com/reports/1265344
🔹 Severity: No Rating
🔹 Reported To: Acronis
🔹 Reported By: #sudo_bash
🔹 State: ⚪️ Informative
🔹 Disclosed: May 3, 2022, 6:41am (UTC)
👉 https://hackerone.com/reports/1265344
🔹 Severity: No Rating
🔹 Reported To: Acronis
🔹 Reported By: #sudo_bash
🔹 State: ⚪️ Informative
🔹 Disclosed: May 3, 2022, 6:41am (UTC)
Blind XSS via Feedback form.
👉 https://hackerone.com/reports/1339034
🔹 Severity: High | 💰 1,250 USD
🔹 Reported To: Judge.me
🔹 Reported By: #b3hlull
🔹 State: 🟢 Resolved
🔹 Disclosed: May 3, 2022, 9:36am (UTC)
👉 https://hackerone.com/reports/1339034
🔹 Severity: High | 💰 1,250 USD
🔹 Reported To: Judge.me
🔹 Reported By: #b3hlull
🔹 State: 🟢 Resolved
🔹 Disclosed: May 3, 2022, 9:36am (UTC)
URL Scheme misconfiguration on TikTok for IOS
👉 https://hackerone.com/reports/1437294
🔹 Severity: Low | 💰 500 USD
🔹 Reported To: TikTok
🔹 Reported By: #glassplant
🔹 State: 🟢 Resolved
🔹 Disclosed: May 4, 2022, 10:17pm (UTC)
👉 https://hackerone.com/reports/1437294
🔹 Severity: Low | 💰 500 USD
🔹 Reported To: TikTok
🔹 Reported By: #glassplant
🔹 State: 🟢 Resolved
🔹 Disclosed: May 4, 2022, 10:17pm (UTC)
One Click Account Hijacking via Unvalidated Deeplink
👉 https://hackerone.com/reports/1500614
🔹 Severity: High | 💰 10,000 USD
🔹 Reported To: TikTok
🔹 Reported By: #fr4via
🔹 State: 🟢 Resolved
🔹 Disclosed: May 4, 2022, 10:23pm (UTC)
👉 https://hackerone.com/reports/1500614
🔹 Severity: High | 💰 10,000 USD
🔹 Reported To: TikTok
🔹 Reported By: #fr4via
🔹 State: 🟢 Resolved
🔹 Disclosed: May 4, 2022, 10:23pm (UTC)
👍4
Clickjacking Vulnerability Can Leads To Delete Developer APP
👉 https://hackerone.com/reports/1416612
🔹 Severity: Low | 💰 500 USD
🔹 Reported To: TikTok
🔹 Reported By: #rioncool22
🔹 State: 🟢 Resolved
🔹 Disclosed: May 4, 2022, 10:25pm (UTC)
👉 https://hackerone.com/reports/1416612
🔹 Severity: Low | 💰 500 USD
🔹 Reported To: TikTok
🔹 Reported By: #rioncool22
🔹 State: 🟢 Resolved
🔹 Disclosed: May 4, 2022, 10:25pm (UTC)
Github Account Takeover which is used as gradle vcs in "github.com/palantir/gradle-launch-config-plugin"
👉 https://hackerone.com/reports/1525578
🔹 Severity: Low | 💰 250 USD
🔹 Reported To: Palantir Public
🔹 Reported By: #codermak
🔹 State: 🟢 Resolved
🔹 Disclosed: May 5, 2022, 1:54pm (UTC)
👉 https://hackerone.com/reports/1525578
🔹 Severity: Low | 💰 250 USD
🔹 Reported To: Palantir Public
🔹 Reported By: #codermak
🔹 State: 🟢 Resolved
🔹 Disclosed: May 5, 2022, 1:54pm (UTC)
Able to bypass email verification and change email to any other user email
👉 https://hackerone.com/reports/1551176
🔹 Severity: High | 💰 5,000 USD
🔹 Reported To: Reddit
🔹 Reported By: #bisesh
🔹 State: 🟢 Resolved
🔹 Disclosed: May 6, 2022, 4:50pm (UTC)
👉 https://hackerone.com/reports/1551176
🔹 Severity: High | 💰 5,000 USD
🔹 Reported To: Reddit
🔹 Reported By: #bisesh
🔹 State: 🟢 Resolved
🔹 Disclosed: May 6, 2022, 4:50pm (UTC)
👍3👏2
SQL injection in URL path processing on www.ibm.com
👉 https://hackerone.com/reports/1527284
🔹 Severity: Critical
🔹 Reported To: IBM
🔹 Reported By: #asterite
🔹 State: 🟢 Resolved
🔹 Disclosed: May 6, 2022, 6:37pm (UTC)
👉 https://hackerone.com/reports/1527284
🔹 Severity: Critical
🔹 Reported To: IBM
🔹 Reported By: #asterite
🔹 State: 🟢 Resolved
🔹 Disclosed: May 6, 2022, 6:37pm (UTC)
🔥1
Multiple IDORs in family pairing api
👉 https://hackerone.com/reports/1286332
🔹 Severity: High | 💰 7,500 USD
🔹 Reported To: TikTok
🔹 Reported By: #s3c
🔹 State: 🟢 Resolved
🔹 Disclosed: May 6, 2022, 9:18pm (UTC)
👉 https://hackerone.com/reports/1286332
🔹 Severity: High | 💰 7,500 USD
🔹 Reported To: TikTok
🔹 Reported By: #s3c
🔹 State: 🟢 Resolved
🔹 Disclosed: May 6, 2022, 9:18pm (UTC)
🔥2👍1
Reflected xss in https://sh.reddit.com
👉 https://hackerone.com/reports/1549206
🔹 Severity: High | 💰 5,000 USD
🔹 Reported To: Reddit
🔹 Reported By: #abhiramsita
🔹 State: 🟢 Resolved
🔹 Disclosed: May 8, 2022, 7:36am (UTC)
👉 https://hackerone.com/reports/1549206
🔹 Severity: High | 💰 5,000 USD
🔹 Reported To: Reddit
🔹 Reported By: #abhiramsita
🔹 State: 🟢 Resolved
🔹 Disclosed: May 8, 2022, 7:36am (UTC)
🔥5👍2