Get Mystery Box with random crypto!

Bugpoint

Logo of telegram channel bugpoint — Bugpoint B
Logo of telegram channel bugpoint — Bugpoint
Channel address: @bugpoint
Categories: Technologies
Language: English
Subscribers: 1.23K
Description from channel

Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 4

2022-08-18 23:10:03
IDOR on TikTok Seller

https://hackerone.com/reports/1509057

Severity: Low | 500 USD
Reported To: TikTok
Reported By: #aidilarf_2000
State: Resolved
Disclosed: August 16, 2022, 9:07pm (UTC)
234 views20:10
Open / Comment
2022-08-18 23:10:02
CSRF Account Takeover

https://hackerone.com/reports/1253462

Severity: High | 2,373 USD
Reported To: TikTok
Reported By: #s3c
State: Resolved
Disclosed: August 16, 2022, 9:04pm (UTC)
220 views20:10
Open / Comment
2022-08-18 23:09:03
Delimiter injection in GitHub Actions core.exportVariable

https://hackerone.com/reports/1625652

Severity: Medium | 4,617 USD
Reported To: GitHub
Reported By: #jupenur
State: Resolved
Disclosed: August 18, 2022, 7:44pm (UTC)
232 views20:09
Open / Comment
2022-08-18 23:09:02
Cross Site Scripting Vulnerability in fabric-sdk-py source code

https://hackerone.com/reports/1670187

Severity: No Rating
Reported To: Hyperledger
Reported By: #bhaskar_ram
State: Informative
Disclosed: August 17, 2022, 2:53pm (UTC)
244 views20:09
Open / Comment
2022-06-23 02:00:02
Bypass for Domain-level redirects (Unvalidated Redirects and Forwar)

https://hackerone.com/reports/1582160

Severity: Medium
Reported To: GitLab
Reported By: #thypon
State: Informative
Disclosed: June 22, 2022, 10:57pm (UTC)
104 views23:00
Open / Comment
2022-06-22 08:08:02
Able to approve admin approval and change effective status without adding payment details .

https://hackerone.com/reports/1543159

Severity: High | 5,000 USD
Reported To: Reddit
Reported By: #bisesh
State: Resolved
Disclosed: June 22, 2022, 5:05am (UTC)
119 views05:08
Open / Comment
2022-06-22 01:56:02
Weak rate limit for SIGN.PLUS email verification

https://hackerone.com/reports/1584569

Severity: Low
Reported To: Alohi
Reported By: #zeesozee
State: Resolved
Disclosed: June 21, 2022, 10:53pm (UTC)
148 views22:56
Open / Comment
2022-06-20 18:54:02
Authentication CSRF resulting in unauthorized account access on Krisp app

https://hackerone.com/reports/1267476

Severity: High | 1,000 USD
Reported To: Krisp
Reported By: #yassineaboukir
State: Resolved
Disclosed: June 20, 2022, 3:51pm (UTC)
127 views15:54
Open / Comment
2022-06-20 18:44:03
Add more seats by paying less via PUT /v2/seats request manipulation

https://hackerone.com/reports/1446090

Severity: Medium | 500 USD
Reported To: Krisp
Reported By: #life__001
State: Resolved
Disclosed: June 20, 2022, 3:41pm (UTC)
134 views15:44
Open / Comment
2022-06-20 03:20:02
Admin Authentication Bypass Lead to Admin Account Takeover

https://hackerone.com/reports/1490470

Severity: Medium
Reported To: UPS VDP
Reported By: #7odamo
State: Resolved
Disclosed: June 20, 2022, 12:18am (UTC)
135 views00:20
Open / Comment