Telegram Web Link
CVE-2022-38362: Apache Airflow Docker Provider <3.0 RCE vulnerability in example dag

πŸ‘‰ https://hackerone.com/reports/1671140

πŸ”Ή Severity: High | πŸ’° 4,000 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #happyhacking123
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:16pm (UTC)
CVE-2022-35948: CRLF Injection in Nodejs β€˜undici’ via Content-Type

πŸ‘‰ https://hackerone.com/reports/1664019

πŸ”Ή Severity: Medium | πŸ’° 600 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #happyhacking123
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:38pm (UTC)
πŸ‘1
[CVE-2022-35949]: undici.request vulnerable to SSRF using absolute / protocol-relative URL on pathname

πŸ‘‰ https://hackerone.com/reports/1663788

πŸ”Ή Severity: Medium | πŸ’° 1,200 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 23, 2022, 5:51pm (UTC)
Reflected xss on videostore.mtnonline.com

πŸ‘‰ https://hackerone.com/reports/1646248

πŸ”Ή Severity: High
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #possowski
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 25, 2022, 7:10pm (UTC)
Main Domain Takeover at https://www.marketo.net/

πŸ‘‰ https://hackerone.com/reports/1661914

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #gdattacker
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 26, 2022, 3:05pm (UTC)
XSS Reflected on reddit.com via url path

πŸ‘‰ https://hackerone.com/reports/1051373

πŸ”Ή Severity: High | πŸ’° 5,000 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #criptex
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 27, 2022, 4:04pm (UTC)
insecure gitlab repositories at β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ [HtUS]

πŸ‘‰ https://hackerone.com/reports/1624152

πŸ”Ή Severity: High | πŸ’° 500 USD
πŸ”Ή Reported To: U.S. Dept Of Defense
πŸ”Ή Reported By: #thpless
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 27, 2022, 6:18pm (UTC)
password field autocomplete enabled

πŸ‘‰ https://hackerone.com/reports/1023773

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #er_salil
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 27, 2022, 11:26pm (UTC)
CORS Misconfiguration on Yelp

πŸ‘‰ https://hackerone.com/reports/1707616

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #qualwin3001
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 28, 2022, 3:43am (UTC)
Directory Listing vulnerability on β–ˆ.packet8.net/php/include/

πŸ‘‰ https://hackerone.com/reports/790846

πŸ”Ή Severity: Low
πŸ”Ή Reported To: 8x8
πŸ”Ή Reported By: #rajauzairabdullah
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 28, 2022, 4:41am (UTC)
Server-side request forgery (ssrf)

πŸ‘‰ https://hackerone.com/reports/1712240

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #raja404
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: September 28, 2022, 7:54am (UTC)
DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices)

πŸ‘‰ https://hackerone.com/reports/1632921

πŸ”Ή Severity: High
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #zeyu2001
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 28, 2022, 8:38am (UTC)
Take over subdomains of r2.dev using R2 custom domains

πŸ‘‰ https://hackerone.com/reports/1700276

πŸ”Ή Severity: Medium | πŸ’° 1,125 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #albertspedersen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 28, 2022, 12:49pm (UTC)
CSV export/import functionality allows administrators to modify member and message content of a workspace

πŸ‘‰ https://hackerone.com/reports/1661310

πŸ”Ή Severity: No Rating | πŸ’° 250 USD
πŸ”Ή Reported To: Slack
πŸ”Ή Reported By: #security_warrior
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 28, 2022, 8:30pm (UTC)
XSS in Widget Review Form Preview in settings

πŸ‘‰ https://hackerone.com/reports/1595905

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Judge.me
πŸ”Ή Reported By: #penguinshelp
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 29, 2022, 8:35am (UTC)
no rate limit in forgot password session

πŸ‘‰ https://hackerone.com/reports/1714970

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #irfadps
πŸ”Ή State: πŸ”΄ N/A
πŸ”Ή Disclosed: September 29, 2022, 6:17pm (UTC)
Open Redirect

πŸ‘‰ https://hackerone.com/reports/1581258

πŸ”Ή Severity: Low | πŸ’° 258 USD
πŸ”Ή Reported To: Flickr
πŸ”Ή Reported By: #stevejubs
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 29, 2022, 10:51pm (UTC)
Password Policy Restriction Bypass

πŸ‘‰ https://hackerone.com/reports/1675730

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #lohigowda
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 30, 2022, 8:50am (UTC)
Lack of Packet Sanitation in Goflow Results in Multiple DoS Attack Vectors and Bugs

πŸ‘‰ https://hackerone.com/reports/1636320

πŸ”Ή Severity: High | πŸ’° 500 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #path_network
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 30, 2022, 11:15am (UTC)
Unrestricted File Upload on reddit.secure.force.com

πŸ‘‰ https://hackerone.com/reports/1606957

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Reddit
πŸ”Ή Reported By: #heckintosh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 30, 2022, 2:56pm (UTC)
2025/10/22 21:41:28
Back to Top
HTML Embed Code: