Channel address:
Categories:
Technologies
Language: English
Subscribers:
1.23K
Description from channel
Latest updates about disclosure bug bounty reports: tech details, impacts, bounties 📣
Rate👇
https://cutt.ly/bugpoint_rate
Feedback👇
https://cutt.ly/bugpoint_feedback
#️⃣ bug bounty disclosed reports
#️⃣ bug bounty write-ups
#️⃣ bug bounty teleg
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
1
4 stars
0
3 stars
0
2 stars
0
1 stars
1
The latest Messages 9
2022-06-08 14:48:02
Reflected XSS on https://help.glassdoor.com/gd_requestsubmitpage https://hackerone.com/reports/1094224
Severity: Medium |
500 USD Reported To: Glassdoor
Reported By: #0x7
State: Resolved
Disclosed: June 8, 2022, 11:46am (UTC)
163 views11:48
2022-06-08 14:46:02
Open redirect on https://www.glassdoor.com/profile/siwa.htm via state parameter https://hackerone.com/reports/1097208
Severity: Low |
100 USD Reported To: Glassdoor
Reported By: #0x7
State: Resolved
Disclosed: June 8, 2022, 11:44am (UTC)
164 views11:46
2022-06-07 17:18:05
Path traversal, to RCE https://hackerone.com/reports/733072
Severity: High |
12,000 USD Reported To: GitLab
Reported By: #saltyyolk
State: Resolved
Disclosed: June 7, 2022, 2:16pm (UTC)
205 views14:18
2022-06-07 17:18:04
Steal private objects of other projects via project import https://hackerone.com/reports/743953
Severity: Critical |
20,000 USD Reported To: GitLab
Reported By: #saltyyolk
State: Resolved
Disclosed: June 7, 2022, 2:16pm (UTC)
192 views14:18
2022-06-07 17:18:03
Private objects exposed through project import https://hackerone.com/reports/767770
Severity: Critical |
20,000 USD Reported To: GitLab
Reported By: #saltyyolk
State: Resolved
Disclosed: June 7, 2022, 2:16pm (UTC)
184 views14:18
2022-06-07 17:18:02
Path traversal in Nuget Package Registry https://hackerone.com/reports/822262
Severity: High |
12,000 USD Reported To: GitLab
Reported By: #saltyyolk
State: Resolved
Disclosed: June 7, 2022, 2:16pm (UTC)
185 views14:18
2022-06-07 13:22:02
Store Admin Page Accessible Without Authentication at http://www.grouplogic.com/ADMIN/store/index.cfm https://hackerone.com/reports/1164854
Severity: Medium |
250 USD Reported To: Acronis
Reported By: #ub3rsick
State: Resolved
Disclosed: June 7, 2022, 10:20am (UTC)
184 views10:22
2022-06-07 12:28:02
Stored Cross Site Scripting at http://www.grouplogic.com/ADMIN/store/index.cfm?fa=disprocode https://hackerone.com/reports/1164853
Severity: Medium
Reported To: Acronis
Reported By: #ub3rsick
State: Resolved
Disclosed: June 7, 2022, 9:25am (UTC)
190 views09:28
2022-06-07 02:12:02
Misconfigurated login page able to lock login action for any account without user interaction https://hackerone.com/reports/1582778
Severity: Critical
Reported To: Reddit
Reported By: #h1ugroon
State: Informative
Disclosed: June 6, 2022, 11:10pm (UTC)
209 views23:12
2022-06-06 14:34:03
2 Cache Poisoning Attack Methods Affect Core Functionality www.exodus.com https://hackerone.com/reports/1581454
Severity: High
Reported To: Exodus
Reported By: #bismillahfortuner
State: Informative
Disclosed: June 6, 2022, 11:31am (UTC)
229 views11:34