Get Mystery Box with random crypto!

Bugpoint

Logo of telegram channel bugpoint — Bugpoint B
Logo of telegram channel bugpoint — Bugpoint
Channel address: @bugpoint
Categories: Technologies
Language: English
Subscribers: 1.23K
Description from channel

Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 64

2021-06-10 14:48:02
End to end encryption folder locking is not properly protected

https://hackerone.com/reports/1189174

Severity: Low | 250 USD
Reported To: Nextcloud
Reported By: #rtod
State: Resolved
Disclosed: June 10, 2021, 11:45am (UTC)
147 views11:48
Open / Comment
2021-06-10 14:46:03
Trusted servers exchange can be triggered by attacker

https://hackerone.com/reports/1167853

Severity: Medium | 750 USD
Reported To: Nextcloud
Reported By: #rtod
State: Resolved
Disclosed: June 10, 2021, 11:44am (UTC)
151 views11:46
Open / Comment
2021-06-09 22:04:03
CORS Misconfiguration, could lead to disclosure of sensitive information

https://hackerone.com/reports/1199527

Severity: Medium
Reported To: UPchieve
Reported By: #riski0912
State: Resolved
Disclosed: June 9, 2021, 7:01pm (UTC)
92 views19:04
Open / Comment
2021-06-09 05:24:03
Header modification results in disclosure of Slack infra metadata to unauthorized parties

https://hackerone.com/reports/727330

Severity: Medium | 500 USD
Reported To: Slack
Reported By: #showuon
State: Resolved
Disclosed: June 9, 2021, 2:21am (UTC)
28 views02:24
Open / Comment
2021-06-09 04:40:03
Private program disclosure of `██████████` through notifications

https://hackerone.com/reports/1179241

Severity: Low | 500 USD
Reported To: HackerOne
Reported By: #h13-
State: Resolved
Disclosed: June 9, 2021, 1:37am (UTC)
38 views01:40
Open / Comment
2021-06-08 08:42:02
Cross-Site Scripting through search form on mtnplay.co.zm

https://hackerone.com/reports/761573

Severity: Low
Reported To: MTN Group
Reported By: #droop3r
State: Resolved
Disclosed: June 8, 2021, 5:40am (UTC)
129 views05:42
Open / Comment
2021-06-07 12:34:04
bypass parental pin succesfully

https://hackerone.com/reports/1121169

Severity: Medium | 200 USD
Reported To: Showmax
Reported By: #abdulsec
State: Resolved
Disclosed: June 7, 2021, 9:32am (UTC)
62 views09:34
Open / Comment
2021-06-07 12:34:03
https://secure.showmax.com/profile/payments

https://hackerone.com/reports/1078081

Severity: No Rating
Reported To: Showmax
Reported By: #abhiram
State: Informative
Disclosed: June 7, 2021, 9:31am (UTC)
63 views09:34
Open / Comment
2021-06-06 12:20:02
Acessed internal api documentation and information

https://hackerone.com/reports/1049733

Severity: No Rating
Reported To: Mail.ru
Reported By: #impalanichamy
State: Resolved
Disclosed: June 6, 2021, 9:17am (UTC)
94 views09:20
Open / Comment
2021-06-06 12:16:02
XSS (reflected, and then, cookie persisted) on api documentation site theme selector (old version of dokuwiki)

https://hackerone.com/reports/1066502

Severity: Medium
Reported To: Mail.ru
Reported By: #mvm
State: Resolved
Disclosed: June 6, 2021, 9:14am (UTC)
98 views09:16
Open / Comment