Get Mystery Box with random crypto!

Bugpoint

Logo of telegram channel bugpoint — Bugpoint B
Logo of telegram channel bugpoint — Bugpoint
Channel address: @bugpoint
Categories: Technologies
Language: English
Subscribers: 1.23K
Description from channel

Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages 80

2021-05-06 15:40:02
Improper Restriction of Excessive Authentication Attempts at https://top.mail.ru/edit? for site counter (Rate Limit bypass via IP Rotation)

https://hackerone.com/reports/1020943

Severity: Low | 150 USD
Reported To: Mail.ru
Reported By: #jayesh25
State: Resolved
Disclosed: May 6, 2021, 12:37pm (UTC)
123 views12:40
Open / Comment
2021-05-06 15:36:02
Clickjacking Vulnerability via https://profile.my.games/gamecenter/profile/ can lead to sensitive cross site actions (Bypass X-Frame-Options)

https://hackerone.com/reports/974090

Severity: Low | 150 USD
Reported To: Mail.ru
Reported By: #jayesh25
State: Resolved
Disclosed: May 6, 2021, 12:33pm (UTC)
119 views12:36
Open / Comment
2021-05-06 15:32:02
Improper Restriction of Excessive Authentication Attempts at https://mirror.w1.dwar.ru/login.php

https://hackerone.com/reports/914877

Severity: Low | 150 USD
Reported To: Mail.ru
Reported By: #jayesh25
State: Resolved
Disclosed: May 6, 2021, 12:30pm (UTC)
115 views12:32
Open / Comment
2021-05-06 12:46:02
Bypass of Rate limiting in secure_session endpoint's password input will lead to user password disclosure

https://hackerone.com/reports/269318

Severity: No Rating | 50 USD
Reported To: Moneybird
Reported By: #0xprial
State: Resolved
Disclosed: May 6, 2021, 9:43am (UTC)
124 views09:46
Open / Comment
2021-05-06 09:32:03
Editing Pentest Summary Report Answers After Submitting Them

https://hackerone.com/reports/1139528

Severity: Low
Reported To: HackerOne
Reported By: #whhackersbr
State: Resolved
Disclosed: May 6, 2021, 6:30am (UTC)
136 views06:32
Open / Comment
2021-05-06 09:32:02
Changing the 2FA secret key and backup codes without knowing the 2FA OTP

https://hackerone.com/reports/1139535

Severity: Medium
Reported To: HackerOne
Reported By: #whhackersbr
State: Resolved
Disclosed: May 6, 2021, 6:30am (UTC)
121 views06:32
Open / Comment
2021-05-05 23:24:03
Versa Director is susceptible to Command Injection attacks (e.g., SQL, LDAP, XML, Xpath)

https://hackerone.com/reports/1168198

Severity: High
Reported To: Versa Networks
Reported By: #not_specified
State: Resolved
Disclosed: May 5, 2021, 8:21pm (UTC)
124 views20:24
Open / Comment
2021-05-05 23:24:02
Unapproved SSH Encryption Enabled

https://hackerone.com/reports/1168196

Severity: Medium
Reported To: Versa Networks
Reported By: #not_specified
State: Resolved
Disclosed: May 5, 2021, 8:21pm (UTC)
121 views20:24
Open / Comment
2021-05-05 23:22:05
Possible to change log level without authentication

https://hackerone.com/reports/1168193

Severity: Medium
Reported To: Versa Networks
Reported By: #not_specified
State: Resolved
Disclosed: May 5, 2021, 8:20pm (UTC)
117 views20:22
Open / Comment
2021-05-05 23:22:04
Session Fixation Exposure

https://hackerone.com/reports/1168192

Severity: Medium
Reported To: Versa Networks
Reported By: #not_specified
State: Resolved
Disclosed: May 5, 2021, 8:20pm (UTC)
106 views20:22
Open / Comment