Telegram Web
Weak randomness in WebCrypto keygen

πŸ‘‰ https://hackerone.com/reports/1690000

πŸ”Ή Severity: High
πŸ”Ή Reported To: Node.js
πŸ”Ή Reported By: #bnoordhuis
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 26, 2022, 8:18am (UTC)
πŸ‘1
Subdomain takeover on 'de-headless.staging.gymshark.com'

πŸ‘‰ https://hackerone.com/reports/1711890

πŸ”Ή Severity: High
πŸ”Ή Reported To: Gymshark
πŸ”Ή Reported By: #a-p0c
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 27, 2022, 11:14am (UTC)
CVE-2022-35260: .netrc parser out-of-bounds access

πŸ‘‰ https://hackerone.com/reports/1721098

πŸ”Ή Severity: Low
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #kurohiro
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 27, 2022, 2:55pm (UTC)
πŸ‘1
CVE-2022-42916: HSTS bypass via IDN

πŸ‘‰ https://hackerone.com/reports/1730660

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: curl
πŸ”Ή Reported By: #kurohiro
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 27, 2022, 2:55pm (UTC)
πŸ‘1
Jolokia Reflected XSS

πŸ‘‰ https://hackerone.com/reports/1714563

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: Mars
πŸ”Ή Reported By: #ramzanrl
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 27, 2022, 5:36pm (UTC)
πŸ‘1
HTML INJECTION FOUND ON https://adobedocs.github.io/analytics-1.4-apis/swagger-docs.html DUE TO OUTDATED SWAGGER UI

πŸ‘‰ https://hackerone.com/reports/1736466

πŸ”Ή Severity: Low
πŸ”Ή Reported To: Adobe
πŸ”Ή Reported By: #dreamer_eh
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 28, 2022, 7:18am (UTC)
πŸ‘1
Privilege Escalation to All-staff group

πŸ‘‰ https://hackerone.com/reports/1021460

πŸ”Ή Severity: Medium | πŸ’° 500 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 28, 2022, 11:55pm (UTC)
Accessing/Editing Folders of Other Users in the Orginisation.

πŸ‘‰ https://hackerone.com/reports/1025881

πŸ”Ή Severity: High | πŸ’° 1,000 USD
πŸ”Ή Reported To: Lark Technologies
πŸ”Ή Reported By: #snapsec
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 29, 2022, 12:56am (UTC)
Cross-site Scripting (XSS) - Reflected

πŸ‘‰ https://hackerone.com/reports/1183336

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #lu3ky-13
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 30, 2022, 9:54pm (UTC)
Cross-Site Request Forgery (CSRF) to xss

πŸ‘‰ https://hackerone.com/reports/1183241

πŸ”Ή Severity: Medium
πŸ”Ή Reported To: MTN Group
πŸ”Ή Reported By: #lu3ky-13
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 30, 2022, 9:54pm (UTC)
XSS in SocialIcon Link

πŸ‘‰ https://hackerone.com/reports/1698652

πŸ”Ή Severity: High | πŸ’° 2,500 USD
πŸ”Ή Reported To: Linktree
πŸ”Ή Reported By: #sudi
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 31, 2022, 4:04am (UTC)
Authentication bypass for β–ˆβ–ˆβ–ˆ leads to take over any users account.

πŸ‘‰ https://hackerone.com/reports/1608151

πŸ”Ή Severity: Critical | πŸ’° 5,000 USD
πŸ”Ή Reported To: Krisp
πŸ”Ή Reported By: #n0_m3rcy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: October 31, 2022, 5:56pm (UTC)
IDOR in API applications (able to see any API token, leads to account takeover)

πŸ‘‰ https://hackerone.com/reports/1695454

πŸ”Ή Severity: Critical | πŸ’° 500 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #bugra
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 1, 2022, 10:46pm (UTC)
Stored XSS in intensedebate.com via the Comments RSS

πŸ‘‰ https://hackerone.com/reports/1664914

πŸ”Ή Severity: Medium | πŸ’° 150 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #bugra
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 2, 2022, 9:20am (UTC)
CVE-2022-42916: HSTS bypass via IDN

πŸ‘‰ https://hackerone.com/reports/1753226

πŸ”Ή Severity: Medium | πŸ’° 2,400 USD
πŸ”Ή Reported To: Internet Bug Bounty
πŸ”Ή Reported By: #kurohiro
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 3, 2022, 12:19am (UTC)
Archived / Deleted / Private Poll Can Be Viewed by Another Users [Crowdsignal WordPress plugins]

πŸ‘‰ https://hackerone.com/reports/1711318

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: Automattic
πŸ”Ή Reported By: #apapedulimu
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 3, 2022, 11:41am (UTC)
Command injection in GitHub Actions ContainerStepHost

πŸ‘‰ https://hackerone.com/reports/1637621

πŸ”Ή Severity: No Rating | πŸ’° 4,000 USD
πŸ”Ή Reported To: GitHub
πŸ”Ή Reported By: #jupenur
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 3, 2022, 3:33pm (UTC)
RepositoryPipeline allows importing of local git repos

πŸ‘‰ https://hackerone.com/reports/1685822

πŸ”Ή Severity: Medium | πŸ’° 22,300 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #vakzz
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 4, 2022, 3:43am (UTC)
DOS via move_issue

πŸ‘‰ https://hackerone.com/reports/1543584

πŸ”Ή Severity: Medium | πŸ’° 2,300 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #legit-security
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 4, 2022, 3:44am (UTC)
Path paths and file disclosure vulnerabilities at influxdb.quality.gitlab.net

πŸ‘‰ https://hackerone.com/reports/1643962

πŸ”Ή Severity: Low | πŸ’° 100 USD
πŸ”Ή Reported To: GitLab
πŸ”Ή Reported By: #otoyyy
πŸ”Ή State: 🟒 Resolved
πŸ”Ή Disclosed: November 4, 2022, 3:46am (UTC)
2025/07/14 11:02:17
Back to Top
HTML Embed Code: