Bugpoint – Telegram
Bugpoint
1.06K subscribers
3.73K photos
3.73K links
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣

Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback

#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Download Telegram
User information disclosed via API

👉 https://hackerone.com/reports/1218461

🔹 Severity: High
🔹 Reported To: U.S. General Services Administration
🔹 Reported By: #toormund
🔹 State: 🟢 Resolved
🔹 Disclosed: October 19, 2022, 6:47pm (UTC)
Local applications from user's computer can listen for webhooks via insecure gRPC server from stripe-cli

👉 https://hackerone.com/reports/1369191

🔹 Severity: Low | 💰 500 USD
🔹 Reported To: Stripe
🔹 Reported By: #gregxsunday
🔹 State: 🟢 Resolved
🔹 Disclosed: October 19, 2022, 7:03pm (UTC)
👍1
Mass Accounts Takeover Without any user Interaction at https://app.taxjar.com/

👉 https://hackerone.com/reports/1685970

🔹 Severity: High | 💰 13,000 USD
🔹 Reported To: Stripe
🔹 Reported By: #mr_asg
🔹 State: 🟢 Resolved
🔹 Disclosed: October 19, 2022, 7:05pm (UTC)
[CSRF] No Csrf protection against sending invitation to join the team.

👉 https://hackerone.com/reports/728199

🔹 Severity: Medium | 💰 1,000 USD
🔹 Reported To: Lark Technologies
🔹 Reported By: #imran_nisar
🔹 State: 🟢 Resolved
🔹 Disclosed: October 20, 2022, 12:31am (UTC)
Ability to View Non-Permitted Admin Log

👉 https://hackerone.com/reports/1533220

🔹 Severity: Medium | 💰 500 USD
🔹 Reported To: Lark Technologies
🔹 Reported By: #imran_nisar
🔹 State: 🟢 Resolved
🔹 Disclosed: October 20, 2022, 12:34am (UTC)
Removed user can still view comments on the file/documents.

👉 https://hackerone.com/reports/1335070

🔹 Severity: Medium | 💰 750 USD
🔹 Reported To: Lark Technologies
🔹 Reported By: #imran_nisar
🔹 State: 🟢 Resolved
🔹 Disclosed: October 20, 2022, 12:36am (UTC)
POOL_UPGRADE request handler may allow an unauthenticated attacker to remotely execute code on every node in the network.

👉 https://hackerone.com/reports/1705717

🔹 Severity: Critical | 💰 2,000 USD
🔹 Reported To: Hyperledger
🔹 Reported By: #shakedreiner
🔹 State: 🟢 Resolved
🔹 Disclosed: October 20, 2022, 8:07pm (UTC)
Card requirement bypass for business trial

👉 https://hackerone.com/reports/1670304

🔹 Severity: Low | 💰 100 USD
🔹 Reported To: Krisp
🔹 Reported By: #n0_m3rcy
🔹 State: 🟢 Resolved
🔹 Disclosed: October 21, 2022, 4:23pm (UTC)
access nagios dashboard using default credentials in ** omon1.fpki.gov, 3.220.248.203**

👉 https://hackerone.com/reports/1700896

🔹 Severity: Critical
🔹 Reported To: U.S. General Services Administration
🔹 Reported By: #ahmed0x0mahmoud
🔹 State: 🟢 Resolved
🔹 Disclosed: October 21, 2022, 11:33pm (UTC)
installed.json sensitive file was publicly accessible on your web application which discloses information about authors and admins

👉 https://hackerone.com/reports/1586524

🔹 Severity: Low
🔹 Reported To: Yelp
🔹 Reported By: #whitehacker18
🔹 State: ⚪️ Informative
🔹 Disclosed: October 22, 2022, 6:39pm (UTC)
Viewer is able to leak the previous versions of the file

👉 https://hackerone.com/reports/1080700

🔹 Severity: Medium | 💰 550 USD
🔹 Reported To: Lark Technologies
🔹 Reported By: #snapsec
🔹 State: 🟢 Resolved
🔹 Disclosed: October 24, 2022, 9:56pm (UTC)
IDOR Allows Viewer to Delete Bin's Files

👉 https://hackerone.com/reports/1074420

🔹 Severity: Medium | 💰 500 USD
🔹 Reported To: Lark Technologies
🔹 Reported By: #snapsec
🔹 State: 🟢 Resolved
🔹 Disclosed: October 24, 2022, 9:59pm (UTC)
Remotely Accessible Container Advisor exposed performance metrics and resource usage

👉 https://hackerone.com/reports/1697599

🔹 Severity: Low | 💰 100 USD
🔹 Reported To: TikTok
🔹 Reported By: #tw4v3sx
🔹 State: 🟢 Resolved
🔹 Disclosed: October 24, 2022, 10:07pm (UTC)
A malicious admin can be able to permanently disable a Owner(Admin) to access his account

👉 https://hackerone.com/reports/1718574

🔹 Severity: Medium | 💰 600 USD
🔹 Reported To: Linktree
🔹 Reported By: #dewcode91
🔹 State: 🟢 Resolved
🔹 Disclosed: October 25, 2022, 12:49am (UTC)
Reflected Cross site noscripting via Swagger UI

👉 https://hackerone.com/reports/1656650

🔹 Severity: Medium
🔹 Reported To: Adobe
🔹 Reported By: #webcipher101
🔹 State: 🟢 Resolved
🔹 Disclosed: October 25, 2022, 7:14am (UTC)
Business Logic, currency arbitrage - Possibility to pay less than the price in USD

👉 https://hackerone.com/reports/1677155

🔹 Severity: Medium
🔹 Reported To: PortSwigger Web Security
🔹 Reported By: #xctzn
🔹 State: ⚪️ Informative
🔹 Disclosed: October 26, 2022, 6:57am (UTC)
HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding (improper fix for CVE-2022-32215)

👉 https://hackerone.com/reports/1665156

🔹 Severity: Medium
🔹 Reported To: Node.js
🔹 Reported By: #shacharm
🔹 State: 🟢 Resolved
🔹 Disclosed: October 26, 2022, 8:17am (UTC)
Node 18 reads openssl.cnf from /home/iojs/build/... upon startup on MacOS

👉 https://hackerone.com/reports/1695596

🔹 Severity: Medium
🔹 Reported To: Node.js
🔹 Reported By: #mhdawson
🔹 State: 🟢 Resolved
🔹 Disclosed: October 26, 2022, 8:17am (UTC)
CVE-2022-32213 bypass via obs-fold mechanic

👉 https://hackerone.com/reports/1630336

🔹 Severity: Medium
🔹 Reported To: Node.js
🔹 Reported By: #haxatron1
🔹 State: 🟢 Resolved
🔹 Disclosed: October 26, 2022, 8:17am (UTC)
HTTP Request Smuggling Due to Incorrect Parsing of Header Fields

👉 https://hackerone.com/reports/1675191

🔹 Severity: Medium
🔹 Reported To: Node.js
🔹 Reported By: #vvx7
🔹 State: 🟢 Resolved
🔹 Disclosed: October 26, 2022, 8:17am (UTC)
Weak randomness in WebCrypto keygen

👉 https://hackerone.com/reports/1690000

🔹 Severity: High
🔹 Reported To: Node.js
🔹 Reported By: #bnoordhuis
🔹 State: 🟢 Resolved
🔹 Disclosed: October 26, 2022, 8:18am (UTC)
👍1