Get Mystery Box with random crypto!

Bugpoint

Logo of telegram channel bugpoint — Bugpoint B
Logo of telegram channel bugpoint — Bugpoint
Channel address: @bugpoint
Categories: Technologies
Language: English
Subscribers: 1.23K
Description from channel

Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 12

2022-05-27 10:24:02
Notification implicit PendingIntent in com.nextcloud.client allows to access contacts

https://hackerone.com/reports/1161401

Severity: Low | 250 USD
Reported To: Nextcloud
Reported By: #qj_test
State: Resolved
Disclosed: May 27, 2022, 7:23am (UTC)
84 views07:24
Open / Comment
2022-05-27 01:20:02
Full read SSRF in flyte-poc-us-east4.uberinternal.com

https://hackerone.com/reports/1540906

Severity: Medium | 2,000 USD
Reported To: Uber
Reported By: #ian
State: Resolved
Disclosed: May 26, 2022, 10:18pm (UTC)
117 views22:20
Open / Comment
2022-05-26 19:26:02
[Urgent] Critical Vulnerability [RCE] on ███ vulnerable to Remote Code Execution by exploiting MS15-034, CVE-2015-1635

https://hackerone.com/reports/469730

Severity: High
Reported To: U.S. Dept Of Defense
Reported By: #ashutosh7
State: Resolved
Disclosed: May 26, 2022, 4:23pm (UTC)
155 views16:26
Open / Comment
2022-05-26 15:44:02
Read Other Users Reports Through Cloning

https://hackerone.com/reports/1505609

Severity: Medium
Reported To: U.S. General Services Administration
Reported By: #hollaatm3
State: Resolved
Disclosed: May 26, 2022, 12:41pm (UTC)
162 views12:44
Open / Comment
2022-05-25 19:30:04
Blind XSS in app.pullrequest.com/████████ via /reviews/ratings/{uuid}

https://hackerone.com/reports/1558010

Severity: High | 2,500 USD
Reported To: HackerOne
Reported By: #bugra
State: Resolved
Disclosed: May 25, 2022, 4:28pm (UTC)
108 views16:30
Open / Comment
2022-05-25 15:12:02
Stored XSS in Notes (with CSP bypass for gitlab.com)

https://hackerone.com/reports/1481207

Severity: High | 13,950 USD
Reported To: GitLab
Reported By: #joaxcar
State: Resolved
Disclosed: May 25, 2022, 12:09pm (UTC)
136 views12:12
Open / Comment
2022-05-25 10:48:01
Email templates XSS by filterXSS bypass

https://hackerone.com/reports/1404804

Severity: Medium | 500 USD
Reported To: Judge.me
Reported By: #caue
State: Resolved
Disclosed: May 25, 2022, 7:45am (UTC)
158 views07:48
Open / Comment
2022-05-25 02:58:02
Critical broken cookie signing on dagobah.flickr.com

https://hackerone.com/reports/1440290

Severity: Medium | 479 USD
Reported To: Flickr
Reported By: #ian
State: Resolved
Disclosed: May 24, 2022, 11:56pm (UTC)
176 views23:58
Open / Comment
2022-05-24 18:26:02
[com.exness.android.pa Android] Universal XSS in webview. Lead to steal user cookies

https://hackerone.com/reports/532836

Severity: No Rating | 400 USD
Reported To: EXNESS
Reported By: #nearsecurity
State: Resolved
Disclosed: May 24, 2022, 3:24pm (UTC)
69 views15:26
Open / Comment
2022-05-24 14:56:02
Cross-site scripting on dashboard2.omise.co

https://hackerone.com/reports/1532858

Severity: Critical | 200 USD
Reported To: Omise
Reported By: #oblivionlight
State: Resolved
Disclosed: May 24, 2022, 11:54am (UTC)
115 views11:56
Open / Comment