Get Mystery Box with random crypto!

Bugpoint

Logo of telegram channel bugpoint — Bugpoint B
Logo of telegram channel bugpoint — Bugpoint
Channel address: @bugpoint
Categories: Technologies
Language: English
Subscribers: 1.23K
Description from channel

Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 79

2021-05-07 19:06:03
ETHEREUM_PRIVATE_KEY leaked

https://hackerone.com/reports/1183269

Severity: No Rating
Reported To: Sifchain
Reported By: #dexter34
State: N/A
Disclosed: May 7, 2021, 4:04pm (UTC)
114 views16:06
Open / Comment
2021-05-07 19:02:03
Exposed Openapi Token

https://hackerone.com/reports/1132690

Severity: Critical
Reported To: Sifchain
Reported By: #johnjhacking
State: Informative
Disclosed: May 7, 2021, 4:00pm (UTC)
115 views16:02
Open / Comment
2021-05-07 18:54:03
Possibility of DoS attack at https://sifchain.finance// via CVE-2018-6389 exploitation

https://hackerone.com/reports/1186985

Severity: No Rating
Reported To: Sifchain
Reported By: #spyata
State: Informative
Disclosed: May 7, 2021, 3:52pm (UTC)
123 views15:54
Open / Comment
2021-05-07 14:52:02
Code Injection Bug Report

https://hackerone.com/reports/745921

Severity: No Rating
Reported To: Ruby
Reported By: #geeknik
State: Resolved
Disclosed: May 7, 2021, 11:50am (UTC)
135 views11:52
Open / Comment
2021-05-07 10:46:02
Disavowing an account doesn't disable it

https://hackerone.com/reports/1165015

Severity: Low
Reported To: Liberapay
Reported By: #raven_in_matrix
State: Informative
Disclosed: May 7, 2021, 7:43am (UTC)
77 views07:46
Open / Comment
2021-05-07 07:48:02
TAMS registration details API for admins open at https://tamsapi.gsa.gov/user/tams/api/usermgmnt/pendingUserDetails/

https://hackerone.com/reports/1061292

Severity: High
Reported To: U.S. General Services Administration
Reported By: #skarsom
State: Resolved
Disclosed: May 7, 2021, 4:45am (UTC)
100 views04:48
Open / Comment
2021-05-06 19:20:02
[CS:GO] Unchecked texture file name with TEXTUREFLAGS_DEPTHRENDERTARGET can lead to Remote Code Execution

https://hackerone.com/reports/550625

Severity: High | 2,500 USD
Reported To: Valve
Reported By: #nyancat0131
State: Resolved
Disclosed: May 6, 2021, 4:17pm (UTC)
131 views16:20
Open / Comment
2021-05-06 19:18:01
[Source Engine] Material path truncation leads to Remote Code Execution

https://hackerone.com/reports/544096

Severity: High | 2,500 USD
Reported To: Valve
Reported By: #nyancat0131
State: Resolved
Disclosed: May 6, 2021, 4:16pm (UTC)
122 views16:18
Open / Comment
2021-05-06 17:48:02
xmlrpc.php And /wp-json/wp/v2/users FILE IS enable it will used for bruteforce attack and denial of service

https://hackerone.com/reports/1147449

Severity: Low | 50 USD
Reported To: Sifchain
Reported By: #a-heybati
State: Informative
Disclosed: May 6, 2021, 2:46pm (UTC)
123 views14:48
Open / Comment
2021-05-06 15:44:02
CVE-2020-3187 на ip адресе 91.231.115.30

https://hackerone.com/reports/1023792

Severity: Medium | 150 USD
Reported To: Mail.ru
Reported By: #b404c057ae68e03c3dc721d
State: Resolved
Disclosed: May 6, 2021, 12:42pm (UTC)
129 views12:44
Open / Comment