Get Mystery Box with random crypto!

Bugpoint

Logo of telegram channel bugpoint — Bugpoint B
Logo of telegram channel bugpoint — Bugpoint
Channel address: @bugpoint
Categories: Technologies
Language: English
Subscribers: 1.23K
Description from channel

Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 11

2022-05-31 22:16:02
Deprecated owners.query API bypasses object view policy

https://hackerone.com/reports/1584409

Severity: No Rating | 300 USD
Reported To: Phabricator
Reported By: #dyls
State: Resolved
Disclosed: May 31, 2022, 7:14pm (UTC)
80 views19:16
Open / Comment
2022-05-31 20:18:02
Able to bypass the fix on DOM XSS at [www.adobe.com]

https://hackerone.com/reports/1398374

Severity: Medium
Reported To: Adobe
Reported By: #saajanbhujel
State: Resolved
Disclosed: May 31, 2022, 5:16pm (UTC)
109 views17:18
Open / Comment
2022-05-31 20:16:02
DOM XSS on www.adobe.com

https://hackerone.com/reports/1260825

Severity: Medium
Reported To: Adobe
Reported By: #saajanbhujel
State: Resolved
Disclosed: May 31, 2022, 5:14pm (UTC)
109 views17:16
Open / Comment
2022-05-31 20:08:03
CSRF token validation system is disabled on Stripe Dashboard

https://hackerone.com/reports/1493437

Severity: Medium | 2,500 USD
Reported To: Stripe
Reported By: #rodolfomarianocy
State: Resolved
Disclosed: May 31, 2022, 5:05pm (UTC)
106 views17:08
Open / Comment
2022-05-31 17:40:03
Improper input-size validation on the user new session name can result in server-side DDoS.

https://hackerone.com/reports/1153138

Severity: Medium | 100 USD
Reported To: Nextcloud
Reported By: #demonia
State: Resolved
Disclosed: May 31, 2022, 2:37pm (UTC)
135 views14:40
Open / Comment
2022-05-31 13:18:03
BlIND XSS on https://open.vanillaforums.com

https://hackerone.com/reports/1189885

Severity: High | 300 USD
Reported To: Vanilla
Reported By: #mohit0786
State: Resolved
Disclosed: May 31, 2022, 10:15am (UTC)
167 views10:18
Open / Comment
2022-05-31 12:12:02
Self XSS in attachments name

https://hackerone.com/reports/1536901

Severity: Low
Reported To: Acronis
Reported By: #mega7
State: Resolved
Disclosed: May 31, 2022, 9:10am (UTC)
162 views09:12
Open / Comment
2022-05-30 12:24:02
Users who are restricted to use the application because of a "Waiting List" are able to get access to the Beta Application by bypassing the waitlist

https://hackerone.com/reports/1494308

Severity: Low
Reported To: Alohi
Reported By: #darkknight4688
State: Resolved
Disclosed: May 30, 2022, 9:21am (UTC)
189 views09:24
Open / Comment
2022-05-28 21:20:04
CVE-2022-28738: Double free in Regexp compilation

https://hackerone.com/reports/1549636

Severity: High | 4,000 USD
Reported To: Internet Bug Bounty
Reported By: #piao
State: Resolved
Disclosed: May 28, 2022, 6:18pm (UTC)
134 views18:20
Open / Comment
2022-05-27 10:26:02
Control character filtering misses leading and trailing whitespace in file and folder names

https://hackerone.com/reports/1402249

Severity: Medium | 100 USD
Reported To: Nextcloud
Reported By: #david_h1
State: Resolved
Disclosed: May 27, 2022, 7:23am (UTC)
84 views07:26
Open / Comment