Get Mystery Box with random crypto!

Bugpoint

Logo of telegram channel bugpoint — Bugpoint B
Logo of telegram channel bugpoint — Bugpoint
Channel address: @bugpoint
Categories: Technologies
Language: English
Subscribers: 1.23K
Description from channel

Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 71

2021-05-23 04:24:03
Readonly to Root Privilege Escalation on EdgeSwitch

https://hackerone.com/reports/796414

Severity: High | 6,690 USD
Reported To: Ubiquiti Inc.
Reported By: #fr33rh
State: Resolved
Disclosed: May 23, 2021, 1:22am (UTC)
130 views01:24
Open / Comment
2021-05-23 04:24:02
Web Server Predictable Session ID on EdgeSwitch

https://hackerone.com/reports/774393

Severity: High | 6,690 USD
Reported To: Ubiquiti Inc.
Reported By: #fr33rh
State: Resolved
Disclosed: May 23, 2021, 1:22am (UTC)
127 views01:24
Open / Comment
2021-05-22 11:32:01
SSRF на https://qiwi.com с помощью "Prerender HAR Capturer"

https://hackerone.com/reports/1153862

Severity: Critical | 1,500 USD
Reported To: QIWI
Reported By: #myway
State: Resolved
Disclosed: May 22, 2021, 8:29am (UTC)
103 views08:32
Open / Comment
2021-05-22 01:42:02
User Information Disclosure via waitlist.blockfi.com Prefinery Abuse

https://hackerone.com/reports/1135294

Severity: High | 1,000 USD
Reported To: BlockFi
Reported By: #tcbutler320
State: Resolved
Disclosed: May 21, 2021, 10:40pm (UTC)
140 views22:42
Open / Comment
2021-05-21 22:58:02
Kroki Arbitrary File Read/Write

https://hackerone.com/reports/1098793

Severity: High | 5,600 USD
Reported To: GitLab
Reported By: #ledz1996
State: Resolved
Disclosed: May 21, 2021, 7:56pm (UTC)
151 views19:58
Open / Comment
2021-05-21 19:18:03
[Python] CWE-400: Regular Expression Injection

https://hackerone.com/reports/1196124

Severity: High | 4,500 USD
Reported To: GitHub Security Lab
Reported By: #jorgectf
State: Resolved
Disclosed: May 21, 2021, 4:15pm (UTC)
461 views16:18
Open / Comment
2021-05-21 19:18:02
[Java] CWE-078: Add JSch lib OS Command Injection sink

https://hackerone.com/reports/1196125

Severity: Medium | 1,800 USD
Reported To: GitHub Security Lab
Reported By: #p0wn4j
State: Resolved
Disclosed: May 21, 2021, 4:15pm (UTC)
163 views16:18
Open / Comment
2021-05-21 19:16:04
[Java]: CWE-601 Spring url redirection detect

https://hackerone.com/reports/1204658

Severity: Medium | 1,800 USD
Reported To: GitHub Security Lab
Reported By: #jessforfun
State: Resolved
Disclosed: May 21, 2021, 4:14pm (UTC)
146 views16:16
Open / Comment
2021-05-21 19:16:03
[Java] CWE-094: Jython code injection

https://hackerone.com/reports/1204659

Severity: Medium | 1,800 USD
Reported To: GitHub Security Lab
Reported By: #luchua
State: Resolved
Disclosed: May 21, 2021, 4:14pm (UTC)
144 views16:16
Open / Comment
2021-05-21 19:16:02
[Java] CWE-094: Rhino code injection

https://hackerone.com/reports/1204660

Severity: Medium | 1,800 USD
Reported To: GitHub Security Lab
Reported By: #luchua
State: Resolved
Disclosed: May 21, 2021, 4:14pm (UTC)
144 views16:16
Open / Comment