Telegram Web
User information disclosed via API

πŸ‘‰ https://hackerone.com/reports/1218461

πŸ”Ή Severity: High
πŸ”Ή Reported To: U.S. General Services Administration
πŸ”Ή Reported By: #toormund
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 6:47pm (UTC)
Local applications from user's computer can listen for webhooks via insecure gRPC server from stripe-cli

πŸ‘‰ https://hackerone.com/reports/1369191

πŸ”Ή Severity: Low | πŸ’° 500 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #gregxsunday
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 7:03pm (UTC)
πŸ‘1
Mass Accounts Takeover Without any user Interaction at https://app.taxjar.com/

πŸ‘‰ https://hackerone.com/reports/1685970

πŸ”Ή Severity: High | πŸ’° 13,000 USD
πŸ”Ή Reported To: Stripe
πŸ”Ή Reported By: #mr_asg
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 19, 2022, 7:05pm (UTC)
[CSRF] No Csrf protection against sending invitation to join the team.

πŸ‘‰ https://hackerone.com/reports/728199

πŸ”Ή Severity: Medium | πŸ’° 1,000 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 20, 2022, 12:31am (UTC)
Ability to View Non-Permitted Admin Log

πŸ‘‰ https://hackerone.com/reports/1533220

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 20, 2022, 12:34am (UTC)
Removed user can still view comments on the file/documents.

πŸ‘‰ https://hackerone.com/reports/1335070

πŸ”Ή Severity: Medium | πŸ’° 750 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #imran_nisar
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 20, 2022, 12:36am (UTC)
POOL_UPGRADE request handler may allow an unauthenticated attacker to remotely execute code on every node in the network.

πŸ‘‰ https://hackerone.com/reports/1705717

πŸ”Ή Severity: Critical | πŸ’° 2,000 USD
πŸ”Ή Reported To: Hyperledger
πŸ”Ή Reported By: #shakedreiner
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 20, 2022, 8:07pm (UTC)
Card requirement bypass for business trial

πŸ‘‰ https://hackerone.com/reports/1670304

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Krisp
πŸ”Ή Reported By: #n0_m3rcy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 21, 2022, 4:23pm (UTC)
access nagios dashboard using default credentials in ** omon1.fpki.gov, 3.220.248.203**

πŸ‘‰ https://hackerone.com/reports/1700896

πŸ”Ή Severity: Critical
πŸ”Ή Reported To: U.S. General Services Administration
πŸ”Ή Reported By: #ahmed0x0mahmoud
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 21, 2022, 11:33pm (UTC)
installed.json sensitive file was publicly accessible on your web application which discloses information about authors and admins

πŸ‘‰ https://hackerone.com/reports/1586524

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Yelp
πŸ”Ή Reported By: #whitehacker18
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: October 22, 2022, 6:39pm (UTC)
Viewer is able to leak the previous versions of the file

πŸ‘‰ https://hackerone.com/reports/1080700

πŸ”Ή Severity: Medium | πŸ’° 550 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 24, 2022, 9:56pm (UTC)
IDOR Allows Viewer to Delete Bin's Files

πŸ‘‰ https://hackerone.com/reports/1074420

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 24, 2022, 9:59pm (UTC)
Remotely Accessible Container Advisor exposed performance metrics and resource usage

πŸ‘‰ https://hackerone.com/reports/1697599

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: TikTok
πŸ”Ή Reported By: #tw4v3sx
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 24, 2022, 10:07pm (UTC)
A malicious admin can be able to permanently disable a Owner(Admin) to access his account

πŸ‘‰ https://hackerone.com/reports/1718574

πŸ”Ή Severity: Medium | πŸ’° 600 USD
πŸ”Ή Reported To: Linktree
πŸ”Ή Reported By: #dewcode91
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 25, 2022, 12:49am (UTC)
Reflected Cross site scripting via Swagger UI

πŸ‘‰ https://hackerone.com/reports/1656650

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #webcipher101
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 25, 2022, 7:14am (UTC)
Business Logic, currency arbitrage - Possibility to pay less than the price in USD

πŸ‘‰ https://hackerone.com/reports/1677155

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: PortSwigger Web Security
πŸ”Ή Reported By: #xctzn
πŸ”Ή State: βšͺ️ Informative
πŸ”Ή Disclosed: October 26, 2022, 6:57am (UTC)
HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding (improper fix for CVE-2022-32215)

πŸ‘‰ https://hackerone.com/reports/1665156

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #shacharm
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:17am (UTC)
Node 18 reads openssl.cnf from /home/iojs/build/... upon startup on MacOS

πŸ‘‰ https://hackerone.com/reports/1695596

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #mhdawson
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:17am (UTC)
CVE-2022-32213 bypass via obs-fold mechanic

πŸ‘‰ https://hackerone.com/reports/1630336

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #haxatron1
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:17am (UTC)
HTTP Request Smuggling Due to Incorrect Parsing of Header Fields

πŸ‘‰ https://hackerone.com/reports/1675191

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #vvx7
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:17am (UTC)
2025/07/14 20:42:15
Back to Top
HTML Embed Code: