Channel address:
Categories:
Technologies
Language: English
Subscribers:
1.23K
Description from channel
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
1
4 stars
0
3 stars
0
2 stars
0
1 stars
1
The latest Messages 79
2021-05-07 19:06:03
ETHEREUM_PRIVATE_KEY leaked https://hackerone.com/reports/1183269
Severity: No Rating
Reported To: Sifchain
Reported By: #dexter34
State: N/A
Disclosed: May 7, 2021, 4:04pm (UTC)
114 views16:06
2021-05-07 19:02:03
Exposed Openapi Token https://hackerone.com/reports/1132690
Severity: Critical
Reported To: Sifchain
Reported By: #johnjhacking
State: Informative
Disclosed: May 7, 2021, 4:00pm (UTC)
115 views16:02
2021-05-07 18:54:03
Possibility of DoS attack at https://sifchain.finance// via CVE-2018-6389 exploitation https://hackerone.com/reports/1186985
Severity: No Rating
Reported To: Sifchain
Reported By: #spyata
State: Informative
Disclosed: May 7, 2021, 3:52pm (UTC)
123 views15:54
2021-05-07 14:52:02
Code Injection Bug Report https://hackerone.com/reports/745921
Severity: No Rating
Reported To: Ruby
Reported By: #geeknik
State: Resolved
Disclosed: May 7, 2021, 11:50am (UTC)
135 views11:52
2021-05-07 10:46:02
Disavowing an account doesn't disable it https://hackerone.com/reports/1165015
Severity: Low
Reported To: Liberapay
Reported By: #raven_in_matrix
State: Informative
Disclosed: May 7, 2021, 7:43am (UTC)
77 views07:46
2021-05-07 07:48:02
TAMS registration details API for admins open at https://tamsapi.gsa.gov/user/tams/api/usermgmnt/pendingUserDetails/ https://hackerone.com/reports/1061292
Severity: High
Reported To: U.S. General Services Administration
Reported By: #skarsom
State: Resolved
Disclosed: May 7, 2021, 4:45am (UTC)
100 views04:48
2021-05-06 19:20:02
[CS:GO] Unchecked texture file name with TEXTUREFLAGS_DEPTHRENDERTARGET can lead to Remote Code Execution https://hackerone.com/reports/550625
Severity: High |
2,500 USD Reported To: Valve
Reported By: #nyancat0131
State: Resolved
Disclosed: May 6, 2021, 4:17pm (UTC)
131 views16:20
2021-05-06 19:18:01
[Source Engine] Material path truncation leads to Remote Code Execution https://hackerone.com/reports/544096
Severity: High |
2,500 USD Reported To: Valve
Reported By: #nyancat0131
State: Resolved
Disclosed: May 6, 2021, 4:16pm (UTC)
122 views16:18
2021-05-06 17:48:02
xmlrpc.php And /wp-json/wp/v2/users FILE IS enable it will used for bruteforce attack and denial of service https://hackerone.com/reports/1147449
Severity: Low |
50 USD Reported To: Sifchain
Reported By: #a-heybati
State: Informative
Disclosed: May 6, 2021, 2:46pm (UTC)
123 views14:48
2021-05-06 15:44:02
CVE-2020-3187 на ip адресе 91.231.115.30 https://hackerone.com/reports/1023792
Severity: Medium |
150 USD Reported To: Mail.ru
Reported By: #b404c057ae68e03c3dc721d
State: Resolved
Disclosed: May 6, 2021, 12:42pm (UTC)
129 views12:44