Telegram Web Link
Off-by-slash vulnerability in nodejs.org and iojs.org

πŸ‘‰ https://hackerone.com/reports/1631350

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #nagaro
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 2:11pm (UTC)
Golang expvar Information Disclosure

πŸ‘‰ https://hackerone.com/reports/1650035

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: Uber
πŸ”Ή Reported By: #mustafa_farrag
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 3:44pm (UTC)
Reflected XSS on pages.email.sel.sony.com/page.aspx via jobid parameter

πŸ‘‰ https://hackerone.com/reports/1309949

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Sony
πŸ”Ή Reported By: #leo_rac
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 5:59pm (UTC)
NordVPN Linux Client - Unsafe service file permissions leads to Local Privilege Escalation

πŸ‘‰ https://hackerone.com/reports/1218523

πŸ”Ή Severity: Medium | πŸ’° 700 USD
πŸ”Ή Reported To: Nord Security
πŸ”Ή Reported By: #bashketchum
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 24, 2022, 6:48pm (UTC)
Pause-based desync in Apache HTTPD

πŸ‘‰ https://hackerone.com/reports/1667974

πŸ”Ή Severity: High | πŸ’° 4,000 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #albinowax
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 25, 2022, 7:02am (UTC)
πŸ”₯4πŸ‘1
Default Login Credentials on https://broadbandmaps.mtn.com.gh/

πŸ‘‰ https://hackerone.com/reports/1297480

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #theranger
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 25, 2022, 11:05am (UTC)
Non-revoked API Key Information disclosure via Stripo_report()

πŸ‘‰ https://hackerone.com/reports/1613714

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Stripo Inc
πŸ”Ή Reported By: #deb0con
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 25, 2022, 11:05am (UTC)
Unauthorized access

πŸ‘‰ https://hackerone.com/reports/1669176

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #mega7
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: August 25, 2022, 2:14pm (UTC)
Privilege Escalation - "Analyst" Role Can View Email Domains of a Company - [GET /voyager/api/voyagerOrganizationDashEmailDomainMappings]

πŸ‘‰ https://hackerone.com/reports/1572591

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: LinkedIn
πŸ”Ή Reported By: #naaash
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 26, 2022, 6:38pm (UTC)
weak protection against brute-forcing on login api leads to account takeover

πŸ‘‰ https://hackerone.com/reports/766875

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: Palo Alto Software
πŸ”Ή Reported By: #zer0code
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 29, 2022, 6:23pm (UTC)
TikTok's pixel/sdk.js leaks current URL from websites using postMessage

πŸ‘‰ https://hackerone.com/reports/1598749

πŸ”Ή Severity: Medium | πŸ’° 1,500 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #fransrosen
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 30, 2022, 6:25pm (UTC)
πŸ‘3
Blind SSRF on platform.dash.cloudflare.com Due to Sentry misconfiguration

πŸ‘‰ https://hackerone.com/reports/1467044

πŸ”Ή Severity: Low | πŸ’° 200 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #lohigowda
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 31, 2022, 10:54am (UTC)
CVE-2022-35252: control code in cookie denial of service

πŸ‘‰ https://hackerone.com/reports/1613943

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 31, 2022, 10:55am (UTC)
πŸ‘1
Enable 2Fa verification without verifying email leads account takeover

πŸ‘‰ https://hackerone.com/reports/1618021

πŸ”Ή Severity: Medium | πŸ’° 350 USD
πŸ”Ή Reported To: Cloudflare Public Bug Bounty
πŸ”Ή Reported By: #motu-vai
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 31, 2022, 3:43pm (UTC)
Password reset tokens sent to CSP reporting endpoints

πŸ‘‰ https://hackerone.com/reports/1626281

πŸ”Ή Severity: Low | πŸ’° 250 USD
πŸ”Ή Reported To: Snapchat
πŸ”Ή Reported By: #mahfujwhh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: August 31, 2022, 11:53pm (UTC)
Any expired reset password link can still be used to reset the password

πŸ‘‰ https://hackerone.com/reports/1615790

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Acronis
πŸ”Ή Reported By: #mrccrqr
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 9:31am (UTC)
Remote denial of service in HyperLedger Fabric

πŸ‘‰ https://hackerone.com/reports/1635854

πŸ”Ή Severity: High | πŸ’° 1,500 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #fatal0
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 2:05pm (UTC)
API Key reported in #1465145 not rotated and thus is still valid and can be used by anyone

πŸ‘‰ https://hackerone.com/reports/1591770

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #aneeeketh
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: September 1, 2022, 4:05pm (UTC)
Remote code execution due to unvalidated file upload

πŸ‘‰ https://hackerone.com/reports/1164452

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #aliyugombe
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 5:29pm (UTC)
Password reset token leak on third party website via Referer header [cloudivr.mtnbusiness.com.ng]

πŸ‘‰ https://hackerone.com/reports/1320242

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #ibrahimatix0x01
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: September 1, 2022, 8:21pm (UTC)
2025/10/24 19:37:28
Back to Top
HTML Embed Code: