Channel address:
Categories:
Technologies
Language: English
Subscribers:
1.23K
Description from channel
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
1
4 stars
0
3 stars
0
2 stars
0
1 stars
1
The latest Messages 80
2021-05-06 15:40:02
Improper Restriction of Excessive Authentication Attempts at https://top.mail.ru/edit? for site counter (Rate Limit bypass via IP Rotation) https://hackerone.com/reports/1020943
Severity: Low |
150 USD Reported To: Mail.ru
Reported By: #jayesh25
State: Resolved
Disclosed: May 6, 2021, 12:37pm (UTC)
123 views12:40
2021-05-06 15:36:02
Clickjacking Vulnerability via https://profile.my.games/gamecenter/profile/ can lead to sensitive cross site actions (Bypass X-Frame-Options) https://hackerone.com/reports/974090
Severity: Low |
150 USD Reported To: Mail.ru
Reported By: #jayesh25
State: Resolved
Disclosed: May 6, 2021, 12:33pm (UTC)
119 views12:36
2021-05-06 15:32:02
Improper Restriction of Excessive Authentication Attempts at https://mirror.w1.dwar.ru/login.php https://hackerone.com/reports/914877
Severity: Low |
150 USD Reported To: Mail.ru
Reported By: #jayesh25
State: Resolved
Disclosed: May 6, 2021, 12:30pm (UTC)
115 views12:32
2021-05-06 12:46:02
Bypass of Rate limiting in secure_session endpoint's password input will lead to user password disclosure https://hackerone.com/reports/269318
Severity: No Rating |
50 USD Reported To: Moneybird
Reported By: #0xprial
State: Resolved
Disclosed: May 6, 2021, 9:43am (UTC)
124 views09:46
2021-05-06 09:32:03
Editing Pentest Summary Report Answers After Submitting Them https://hackerone.com/reports/1139528
Severity: Low
Reported To: HackerOne
Reported By: #whhackersbr
State: Resolved
Disclosed: May 6, 2021, 6:30am (UTC)
136 views06:32
2021-05-06 09:32:02
Changing the 2FA secret key and backup codes without knowing the 2FA OTP https://hackerone.com/reports/1139535
Severity: Medium
Reported To: HackerOne
Reported By: #whhackersbr
State: Resolved
Disclosed: May 6, 2021, 6:30am (UTC)
121 views06:32
2021-05-05 23:24:03
Versa Director is susceptible to Command Injection attacks (e.g., SQL, LDAP, XML, Xpath) https://hackerone.com/reports/1168198
Severity: High
Reported To: Versa Networks
Reported By: #not_specified
State: Resolved
Disclosed: May 5, 2021, 8:21pm (UTC)
124 views20:24
2021-05-05 23:24:02
Unapproved SSH Encryption Enabled https://hackerone.com/reports/1168196
Severity: Medium
Reported To: Versa Networks
Reported By: #not_specified
State: Resolved
Disclosed: May 5, 2021, 8:21pm (UTC)
121 views20:24
2021-05-05 23:22:05
Possible to change log level without authentication https://hackerone.com/reports/1168193
Severity: Medium
Reported To: Versa Networks
Reported By: #not_specified
State: Resolved
Disclosed: May 5, 2021, 8:20pm (UTC)
117 views20:22
2021-05-05 23:22:04
Session Fixation Exposure https://hackerone.com/reports/1168192
Severity: Medium
Reported To: Versa Networks
Reported By: #not_specified
State: Resolved
Disclosed: May 5, 2021, 8:20pm (UTC)
106 views20:22