id
int64
110
2.48M
title
stringlengths
3
150
created_at
stringdate
2011-07-27 19:59:52
2024-04-25 15:55:33
substate
stringclasses
5 values
vulnerability_information
stringlengths
0
84.5k
reporter
dict
team
dict
has_bounty?
bool
2 classes
visibility
stringclasses
2 values
disclosed_at
stringdate
2013-11-07 00:00:00
2024-05-15 23:05:13
weakness
dict
original_report_id
int64
4.7k
2.38M
vote_count
int64
0
2.59k
structured_scope
dict
411,337
Forget password link not expiring after email change.
2018-09-19T05:13:33.396Z
resolved
I found a token miss configuration flaw in chaturbate.com, When we reset password for a user a link is sent to the registered email address but incase it remain unused and email is updated by user from setting panel then too that old token [reset link] sent at old email address remains valid. #A better explanation 1-...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/S6z7ivTTH8w7QA8J3RbpWRiM/9a55e00ecd2cdf18a7f40678e6836e4cdc90bf95eb4b50c43f5fb775da40bb65" }, "...
{ "awards_miles": false, "default_currency": "usd", "handle": "chaturbate", "id": 30475, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The largest online adult cam site", ...
true
full
2018-09-20T06:42:43.088Z
{ "id": 124, "name": "Improper Authorization" }
null
35
{ "asset_identifier": "chaturbate.com", "asset_type": "URL", "databaseId": 11722, "max_severity": "critical" }
311,805
Cross-origin resource sharing misconfig
2018-02-02T21:19:34.071Z
duplicate
Description An HTML5 cross-origin resource sharing (CORS) policy controls whether and how content running on other domains can perform two-way interaction with the domain that publishes the policy. The policy is fine-grained and can apply access controls per-request based on the URL and other features of the request. T...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/117/520/2ca445c24a43aa38ee4d5937857f7dcbfc4da97b_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "semrush", "id": 15966, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Online Visibility Management Platform.", ...
false
full
2018-03-13T14:23:52.379Z
{ "id": 27, "name": "Improper Authentication - Generic" }
193,559
3
null
385,322
Open API For Username enumeration
2018-07-23T07:32:50.020Z
not-applicable
We Can do username enumeration, Reproduce: 1. Go any wordpress site. #2.www.site.com/?author=1 (type ?author=1 at end of site) 3. You will get www.site.com/author/admin (now, admin is username of login panel of that site) Thanks, Sameer Phad ## Impact -
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/vwlss7nfxhq42yveh4jh6876myka/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "wordpress", "id": 55, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Beautiful sites of any kind.", "name": ...
false
full
2018-07-23T14:33:47.328Z
null
null
24
null
139,398
Read-Only user can execute arbitraty shell commands on AirOS
2016-05-17T17:47:16.026Z
resolved
This vulnerability is very similar to #128750, but it avoid the solution applied to the last beta XM firmware. In this report is used the last beta XM firmware: `XM.v6.0-beta9` # Vulnerability The vulnerability resides in the function `fetchCookies` file `remote.inc:117`. Just like last time is a non sanitization or ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/033/613/8c3e2d95cf9be1554d0d1e8de292b45c73325047_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "ui", "id": 800, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Ubiquiti Inc.", "twitter_hand...
true
full
2016-08-05T09:36:57.491Z
{ "id": 58, "name": "Command Injection - Generic" }
null
43
null
950,201
HTML Injection at "city-mobil.ru"
2020-08-03T13:31:55.282Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/CE24zD8tdJUYD6adpRS69L74/cccd3716a6d2e06174d2a41492445cb1d4bf85b4611a755bc810b9246a24d951" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "mailru", "id": 65, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Building the Internet since 1998", "name"...
false
no-content
2020-12-15T16:14:10.375Z
{ "id": 61, "name": "Cross-site Scripting (XSS) - Reflected" }
null
11
{ "asset_identifier": "Citymobil", "asset_type": "OTHER", "databaseId": 40415, "max_severity": "critical" }
488,371
Insecure Storage and Overly Permissive Google Maps API Key in Android App
2019-01-30T07:12:30.259Z
resolved
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/481/462/6495338f139b675efd88bbc4412fc76613b6df30_original.jpg/3c7b305354c9073c106ae3d1701798def...
{ "awards_miles": false, "default_currency": "usd", "handle": "mailru", "id": 65, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Building the Internet since 1998", "name"...
true
no-content
2019-09-01T12:49:10.910Z
{ "id": 101, "name": "Insecure Storage of Sensitive Information" }
null
10
{ "asset_identifier": "ru.mail.cloud", "asset_type": "GOOGLE_PLAY_APP_ID", "databaseId": 240, "max_severity": "critical" }
272,588
CSRF in Raffles Ticket Purchasing
2017-09-28T04:08:10.330Z
resolved
Description: ======== An API endpoint get executed with no CSRF prevention, the endpoint did not verify session_id required in the post form. An attacker can crafted malicious form (Poc), which is executed by authenticated user action leading to huge balance lost. Poc: === <!doctype html> <html> <head> </head> <bod...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/137/533/339f440fdc61b6dfeb663c8216d249618b8fd451_original.gif/9a55e00ecd2cdf18a7f40678e6836e4cd...
{ "awards_miles": false, "default_currency": "usd", "handle": "unikrn", "id": 2672, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "unikrn offers a world class comprehensive es...
true
full
2018-04-10T02:10:08.175Z
{ "id": 45, "name": "Cross-Site Request Forgery (CSRF)" }
null
19
{ "asset_identifier": "unikrn.com", "asset_type": "URL", "databaseId": 453, "max_severity": "critical" }
1,047,447
HostAuthorization middleware does not suitably sanitize the Host / X-Forwarded-For header allowing redirection.
2020-11-30T23:25:50.430Z
resolved
When a site is configured to use the `.tkte.ch` (leading dot) short form for domain name, ex: ```ruby config.hosts << '.tkte.ch' ``` it is then sanitized in sanitize_string, where it is turned into a regex: ```ruby def sanitize_string(host) if host.start_with?(".") /\A(.+\.)?#{Regexp.e...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/tktech", "username": "tktech", "verified": ...
{ "awards_miles": false, "default_currency": "usd", "handle": "rails", "id": 22, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Web development that doesn't hurt.", "name"...
true
full
2021-02-11T01:39:07.028Z
{ "id": 53, "name": "Open Redirect" }
null
7
{ "asset_identifier": "https://github.com/rails/rails", "asset_type": "SOURCE_CODE", "databaseId": 160, "max_severity": "critical" }
1,406,495
Ability to Disable the Login Attempt of any Shopify Owner for 24 hrs (Zero_Click)
2021-11-21T14:12:27.876Z
resolved
Hello Team, I Found a Bug in which Hacker Have Ability to Disable the Login Attempt of any Shopify Owner With (Zero_Click) Summary: ---------- Proof of Concept; ------------------- Credentials: ------------- Victim = ███████.com (████████) Hacker = █████████.com Victim Sceanrio: ----------------- Step 1 : Victi...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/hdt3mtd2ifw3l8eghlc8ks1z9u0j/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "shopify", "id": 1382, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Shopify is a multi-channel commerce platfor...
true
full
2022-02-15T06:20:35.527Z
{ "id": 102, "name": "Client-Side Enforcement of Server-Side Security" }
null
57
{ "asset_identifier": "accounts.shopify.com", "asset_type": "URL", "databaseId": 423, "max_severity": "critical" }
1,927,480
DiffieHellman doesn't generate keys after setting a key
2023-03-31T13:33:05.838Z
resolved
DiffieHellman doesn't generate keys after setting a key ## Steps To Reproduce: 1. Instantiate: `const dh = crypto.createDiffieHellman(1024);` 2. Set private key: ``` //set private key to 2 dh.setPrivateKey(Buffer.from("02", 'hex')); //outputs 02 (as expected) console.log(dh.getPrivateKey().toString('hex'...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/7v1s2nnar9u3rbd28col4xwngzgi/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "nodejs", "id": 22984, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Node.js JavaScript Runtime", "name"...
false
full
2023-07-20T20:59:27.162Z
{ "id": 227, "name": "Inconsistency Between Implementation and Documented Design" }
null
7
{ "asset_identifier": "https://github.com/nodejs/node", "asset_type": "SOURCE_CODE", "databaseId": 666, "max_severity": "critical" }
94,230
Cross-site Scripting in all Zopim
2015-10-16T14:56:26.648Z
resolved
Hello. This vulnerability works on all sites where there Zopim chat. Vulnerable link: https://www.zopim.com/#1=1&__zopim_widget_proxy=1.zopim.com/s/W/xdds/PIJ4+155G8p7LL3w/c/1444997086678%22%3E%3C/script%3E%3Csvg/onload=alert%28%22XSS%22%29%3E Vulnerable param is __zopim_widget_proxy. For XSS i used "></script><svg/onl...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/038/696/21beef0c831766fad769a95c8f2a66692c65dfc9_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "zendesk", "id": 205, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Zendesk is a leading cloud-based customer se...
true
full
2015-10-20T22:53:27.181Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
2
null
1,137,218
Access control issue on invoice documents downloading feature.
2021-03-26T13:17:25.719Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/icsb2flpwf8cufoi8q8sgdpeaxw4/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "moneybird", "id": 1361, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Cloud accounting", "name": "Moneybird...
true
no-content
2021-04-01T14:16:18.532Z
{ "id": 26, "name": "Improper Access Control - Generic" }
null
26
{ "asset_identifier": "moneybird.com", "asset_type": "URL", "databaseId": 16186, "max_severity": "critical" }
1,474,536
connect.8x8.com: admin user can send invites on behalf of another admin user via POST /api/v1/users/<User ID>/invites
2022-02-08T16:13:35.632Z
resolved
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/ni07o23q7345senc7og6vhuqpkab/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "8x8-bounty", "id": 49732, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "8x8 Bounty", "twitt...
true
no-content
2023-02-15T07:48:12.281Z
{ "id": 26, "name": "Improper Access Control - Generic" }
null
94
{ "asset_identifier": "connect.8x8.com", "asset_type": "URL", "databaseId": 61539, "max_severity": "critical" }
53,088
SSRF vulnerability (access to metadata server on EC2 and OpenStack)
2015-03-23T15:08:49.061Z
resolved
In bug [#50537](https://hackerone.com/reports/50537), **haquaman** reported a SSRF vulnerability in the meme creation section of Phabricator. Ticket [T6755](https://secure.phabricator.com/T6755) was created and the HackerOne issue was closed as "Won't fix". [T6755](https://secure.phabricator.com/T6755) states that *...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/223/9346bb3a772b6433536cfbbe2a0a6c4c7a786fe9_original.jpg/3c7b305354c9073c106ae3d1701798def...
{ "awards_miles": false, "default_currency": "usd", "handle": "phabricator", "id": 18, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Phabricator is a collection of open sourc...
true
full
2015-03-26T18:37:57.571Z
{ "id": 18, "name": "Information Disclosure" }
null
4
null
237,071
X-Frame-Options
2017-06-06T01:35:07.815Z
informative
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/154/935/5f618f48ba808be6d0258844f8d8922dad9c86eb_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "coinbase", "id": 104, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Creating an open financial system for the w...
false
no-content
2017-06-22T17:07:14.836Z
{ "id": 74, "name": "UI Redressing (Clickjacking)" }
null
1
null
14,494
Clickjacking & CSRF attack can be done at https://app.mavenlink.com/login
2014-06-02T22:25:15.066Z
resolved
Hello, My name is Vineet bhardwaj. i am security researcher and i pen test your website( https://app.mavenlink.com/login) and i found there is click jacking attack and CSRF attack can be done. POC: <html><head> <title> CSRF testing </title> <style> frame { opacity: 0.5; border: none; position: absolute...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/006/510/7f9f38ce92d31dade42f9ff5a8bb1ba4c02204a6_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "mavenlink", "id": 48, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Mavenlink provides sophisticated software a...
false
full
2014-09-19T15:35:11.812Z
{ "id": 45, "name": "Cross-Site Request Forgery (CSRF)" }
null
2
null
50,776
A user can edit comments even after video comments are disabled
2015-03-10T09:12:26.084Z
resolved
A user can escalate privileges and edit his previous comments, when comments are disabled for a video. Steps to verify: 1. Log into vimeo.com as Alice. Upload a video (say, video id - 118026546) and allow anyone to leave comments for that video . 2. Login as Bob and navigate to the video URL - https://vimeo.com/11...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/001/170/fc657d5dfd17ac30235e5687c8b2d9b461e0f64e_original.jpg/3c7b305354c9073c106ae3d1701798def...
{ "awards_miles": false, "default_currency": "usd", "handle": "vimeo", "id": 56, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Make life worth watching", "name": "Vimeo",...
true
full
2015-03-11T14:37:33.636Z
{ "id": 75, "name": "Privilege Escalation" }
null
2
null
901,210
Redmin API Key Exposed In GIthub
2020-06-18T03:11:38.534Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/f5nhz1d1xaxs3tetz8pan9scp2dz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "mailru", "id": 65, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Building the Internet since 1998", "name"...
true
no-content
2020-11-25T15:58:05.827Z
{ "id": 18, "name": "Information Disclosure" }
null
20
{ "asset_identifier": "Foodplex", "asset_type": "OTHER", "databaseId": 49351, "max_severity": "critical" }
395,944
Reflected XSS in the npm module express-cart.
2018-08-16T11:34:50.254Z
resolved
> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report! I would like to report Reflected XSS in the npm module...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/avi3719", "username": "avi3719", "verified"...
{ "awards_miles": false, "default_currency": "usd", "handle": "nodejs-ecosystem", "id": 23949, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "This program was used to handle v...
false
full
2019-02-15T06:25:38.924Z
{ "id": 61, "name": "Cross-site Scripting (XSS) - Reflected" }
null
15
{ "asset_identifier": "express-cart", "asset_type": "SOURCE_CODE", "databaseId": 10291, "max_severity": "critical" }
1,067,004
Sensitive data exposure via https://███████/secure/QueryComponent!Default.jspa - CVE-2020-14179
2020-12-27T13:46:56.469Z
resolved
##Summary: Information Disclosure vulnerability in outdated Jira. ##Description: Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa en...
{ "cleared": false, "disabled": true, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/ba56adcb299ff13a87475bf", "username": "ba56adc...
{ "awards_miles": false, "default_currency": "usd", "handle": "deptofdefense", "id": 16064, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. Dept Of Defens...
false
full
2021-01-12T21:43:53.661Z
{ "id": 18, "name": "Information Disclosure" }
null
3
null
1,569,926
Credential leak when use two url
2022-05-13T19:09:38.556Z
not-applicable
## Summary: Curl can leak user credentials if use two url. ## Steps To Reproduce: 1. curl -I -v -u aaa:bbb hackerone.com curl.se 2. the output is: > Connected to hackerone.com (104.16.100.52) port 80 (#0) > Server auth using Basic with user 'aaa' ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/liang1", "username": "liang1", "verified": ...
{ "awards_miles": false, "default_currency": "usd", "handle": "curl", "id": 35663, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "cURL is an Open Source project providing a li...
false
full
2022-06-27T06:55:01.273Z
{ "id": 87, "name": "Insufficiently Protected Credentials" }
null
2
{ "asset_identifier": "https://github.com/curl/curl", "asset_type": "SOURCE_CODE", "databaseId": 18844, "max_severity": "critical" }
67,929
Redirection Page throwing error instead of redirecting to site
2015-06-14T18:45:01.721Z
resolved
Hello I was just testing and found that http://anysite.com.com/index.php?ref=&quot;&gt;&lt;svg/onload=window.onerror=alert;throw/XSS/;// does not shows the usual External link warning page, but shows some error page . Thanks
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/003/771/41805267a81081c293979a5dbc0599bcc4af3ac2_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "security", "id": 13, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Vulnerability disclosure should be safe, tra...
false
full
2016-05-25T02:13:58.505Z
{ "id": 57, "name": "Violation of Secure Design Principles" }
null
3
null
681,468
The password recovery let users know whether an email address exists or not in the website
2019-08-25T00:03:13.241Z
resolved
URL: https://apps.nextcloud.com/password/reset/ I have tried to recover the password for some emails: test@test.com (exists) teste@teste.com.br (does not exists) After I clicked the "reset my password"'s button, the website informed that the email did not exist. ## Impact This is a bad practice, and it is an invit...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/m4eqwpxb19wtullkuv0b4hno7cd6/3c7b305354c9073c106ae3d1701798defaaf5be84...
{ "awards_miles": false, "default_currency": "usd", "handle": "nextcloud", "id": 13291, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Access, share and protect your files, ca...
false
full
2019-11-22T17:51:03.959Z
{ "id": 31, "name": "Improper Restriction of Authentication Attempts" }
null
10
{ "asset_identifier": "apps.nextcloud.com", "asset_type": "URL", "databaseId": 42, "max_severity": "critical" }
2,012,135
[CVE-2023-22799] Possible ReDoS based DoS vulnerability in GlobalID
2023-06-04T08:02:09.284Z
resolved
I made a report and patch at https://hackerone.com/reports/1696752. https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127 > There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expr...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/012/811/4b35334fa2fcf93b2e510174e09470fb42bbf03a_original.gif/9a55e00ecd2cdf18a7f40678e6836e4c...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2023-07-27T06:45:30.531Z
{ "id": 48, "name": "Uncontrolled Resource Consumption" }
null
4
{ "asset_identifier": "https://github.com/rails", "asset_type": "SOURCE_CODE", "databaseId": 80881, "max_severity": "critical" }
872,190
Plaintext storage of a password on kubernetes release bucket
2020-05-12T19:19:27.083Z
informative
Report Submission Form ## Summary: During my recon I found these two buckets dl.k8s.io and dl.kubernetes.io which actually redirects to https://storage.googleapis.com/kubernetes-release/. By searching the string "password" under https://storage.googleapis.com/kubernetes-release/ I found a file called rsyncd.password (...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/NyGLUvi87hCNJqmipxC5NVtJ/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }, "...
{ "awards_miles": false, "default_currency": "usd", "handle": "kubernetes", "id": 39386, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Kubernetes", "twitt...
false
full
2021-01-07T18:30:33.292Z
{ "id": 21, "name": "Plaintext Storage of a Password" }
null
0
{ "asset_identifier": "k8s.io", "asset_type": "URL", "databaseId": 34429, "max_severity": "critical" }
304,708
Information exposure via error pages (www.lahitapiola.fi Tomcat)
2018-01-14T11:59:38.299Z
resolved
**Summary:** Information exposure via error pages **Description:** Hello there! I take the risk that this report might be closed as a N/A but because you are running outdated tomcat I wanted to take this risk and report this to you. So here we go.. When you navigate to the page e.g. https://www.lahitapiola.fi/cs/S...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/qnaqvuyajxqzh6ms6m1hih7hedxw/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd7...
{ "awards_miles": false, "default_currency": "usd", "handle": "localtapiola", "id": 8416, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "LocalTapiola’s products and services c...
true
full
2018-03-02T04:59:45.904Z
{ "id": 82, "name": "Information Exposure Through an Error Message" }
null
6
{ "asset_identifier": "www.lahitapiola.fi", "asset_type": "URL", "databaseId": 1045, "max_severity": "critical" }
1,984,060
After the upload of an private file, using transformations, the file becomes public without the possibility of changing it.
2023-05-11T14:54:33.064Z
resolved
## Summary: When an user uploads a private file, ex (Screenshot 1), where only he has access to. Using the "View transformations" function can generate different kinds of image transformations (Screenshot 2). But after the generation of that transformation for example clicking on the regenerate button next to profile....
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/limusec", "username": "limusec", "verified"...
{ "awards_miles": false, "default_currency": "usd", "handle": "mozilla", "id": 61236, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Mozilla web bug bounty program specific to...
true
full
2023-10-20T09:37:30.009Z
{ "id": 26, "name": "Improper Access Control - Generic" }
null
54
{ "asset_identifier": "phabricator.allizom.org", "asset_type": "URL", "databaseId": 635518, "max_severity": "critical" }
1,068,934
[h1ctf-Grinch Networks] MrR3b00t Saving the Christmas
2020-12-30T19:02:05.093Z
resolved
> Disclaimer: Certain things are a bit modified to set the pieces for the story. Also you can find the flags for all 12 challenges in file F1138300 , Now enjoy :) ``` █▀▄▀█ █▀█ ░ █▀█ █▄▄ █▀█ █▀█ ▀█▀ █░▀░█ █▀▄ ▄ █▀▄ █▄█ █▄█ █▄█ ░█░ saves the Christmas ``` **_Episode - 0x00_ Pil0t.py** It was a gloomy clear night, Mr....
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/WVQ792pdimTiEpL8JcJVzyrn/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }, "...
{ "awards_miles": false, "default_currency": "usd", "handle": "h1-ctf", "id": 46757, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Let's save the holidays together! #Togethe...
false
full
2021-01-11T22:36:53.487Z
null
null
2
{ "asset_identifier": "*.hackyholidays.h1ctf.com", "asset_type": "WILDCARD", "databaseId": 59882, "max_severity": "critical" }
296,622
Blind XXE on pu.vk.com
2017-12-10T01:18:27.212Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/136/191/5e385ddcb9022257bb238b1bba3a1683a75e57e3_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "vkcom", "id": 1254, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "VKontakte is the largest European social net...
true
no-content
2018-03-04T13:15:15.979Z
{ "id": 54, "name": "XML External Entities (XXE)" }
null
16
null
574,638
Lack of proper paymentProfileUUID validation allows any number of free rides without any outstanding balance
2019-05-08T23:55:03.051Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/eequalsmc2", "username": "eequalsmc2", "ver...
{ "awards_miles": false, "default_currency": "usd", "handle": "uber", "id": 314, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Uber", "twitter_handle": ""...
true
no-content
2019-07-18T01:44:08.187Z
{ "id": 65, "name": "Business Logic Errors" }
null
75
null
181,803
SQL Injection /webApp/oma_conf ctx parameter (viestinta.lahitapiola.fi)
2016-11-12T17:58:34.924Z
resolved
**Vulnerable script**: /webApp/oma_conf **Vulnerable parameter**: ctx[vars][email] **Database**: PostgreSQL **PoC** ```http POST /webApp/oma_conf HTTP/1.1 Host: viestinta.lahitapiola.fi Content-Type: application/x-www-form-urlencoded Content-Length: 1131 ctx=%3Cctx+lang%3D%22en%22+date%3D%222016-11-12T17%3A33%3A06Z%2...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/205/e865d3ffcef54eba49cba80bd59502a347519715_original.jpeg/ede8cd84a64d5392a2bb88ecb598721...
{ "awards_miles": false, "default_currency": "usd", "handle": "localtapiola", "id": 8416, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "LocalTapiola’s products and services c...
true
full
2016-12-08T13:19:18.694Z
{ "id": 67, "name": "SQL Injection" }
null
50
null
470,398
Local privilege escalation bug using Keybase redirector on macOS
2018-12-20T21:33:40.369Z
resolved
There's a local privilege escalation bug in the latest version of Keybase for macOS. The issue is in the process of launching `keybase-redirector`. The process works as follows: 1. Copy `keybase-redirector` binary to a root-only location 2. Check its signature 3. Launch the binary [Code ref](https://github.com/keyba...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/votava", "username": "votava", "verified": ...
{ "awards_miles": false, "default_currency": "usd", "handle": "keybase", "id": 2809, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Keybase", "twitter_hand...
true
full
2019-01-30T18:15:40.373Z
{ "id": 75, "name": "Privilege Escalation" }
null
23
null
245,296
Persistent XSS on keybase.io via "payload" field in `/user/sigchain_signature.toffee` template
2017-07-02T09:42:52.752Z
resolved
## Issue Keybase allows you to see other users' sigchains by navigating to <https://keybase.io/<username\>/sigchain>. The "Payload" field containing JSON related to the chainlink on the right side of the page is not correctly escaped during templating, leading to a persistent XSS as users have a high degree of control...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/447/d7846c3a70ff69fbfa83f43531b3ca68c55545df_original.JPG/cccd3716a6d2e06174d2a41492445cb1...
{ "awards_miles": false, "default_currency": "usd", "handle": "keybase", "id": 2809, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Keybase", "twitter_hand...
true
full
2019-03-14T15:15:33.139Z
{ "id": 62, "name": "Cross-site Scripting (XSS) - Stored" }
null
265
null
418,145
No rate limiting in changing room subject.
2018-10-03T12:23:54.508Z
resolved
Before i shed more light on this: I noticed i can create over 200 apps but i don't really know how valid that was. I want to report that there is no rate limiting in changing room subject. Attacker scenrio: 1. Navigate to https://chaturbate.com/b/your username 2. Try to create a room subject and capture the request. 3...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/cunn", "username": "cunn", "verified": fals...
{ "awards_miles": false, "default_currency": "usd", "handle": "chaturbate", "id": 30475, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The largest online adult cam site", ...
true
full
2018-10-09T03:59:44.566Z
null
null
18
{ "asset_identifier": "chaturbate.com", "asset_type": "URL", "databaseId": 11722, "max_severity": "critical" }
238,915
Text injection on status.algolia.com
2017-06-11T06:55:15.028Z
resolved
Hi Algolia team! I just found a text injection vulnerabilty in [status.algolia.com/clusters](https://status.algolia.com/clusters/) . Please follow the steps below. **Vulnerable URL** [status.algolia.com](https://status.algolia.com/clusters/) Steps to reproduce: * Go to [Vulnerable URL](https://status.algolia.com/c...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/111/452/3910a59fc37678124c0b2592126ea98758c2eb43_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "algolia", "id": 443, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Hosted search API that delivers instant and ...
false
full
2017-08-25T10:17:57.962Z
{ "id": 57, "name": "Violation of Secure Design Principles" }
null
3
null
7,898
Persistent Cross-site scripting vulnerability settings.
2014-04-17T19:29:03.968Z
resolved
Hello, I created an account with as group name `"><img src=x onerror=alert(4)>`, after that I went to settings and found a Cross-site scripting vulnerability located at that page. The url for me : https://app.respond.ly/6sjp/settings/account I have a proof of concept in the attachment. best regards Olivi...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/000/045/1828acf6bd0443abccd1796fb54be386d874708c_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca1...
{ "awards_miles": false, "default_currency": "usd", "handle": "respondly", "id": 128, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Team Inbox for Email & Twitter", "nam...
false
full
2014-04-21T16:31:16.010Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
1
null
1,106,009
critical information disclosure
2021-02-17T22:01:23.421Z
resolved
##Description: hey all , I have found critical information through this endpoint /██████; this endpoint contains all env vars used in a www.██████ such as server credentials, db ,mail , twitter client_id and client_secret , facebook client_id and client_secret, etc... ## Impact full access control on every servi...
{ "cleared": false, "disabled": true, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/ba56adcb299ff13a87475bf", "username": "ba56adc...
{ "awards_miles": false, "default_currency": "usd", "handle": "deptofdefense", "id": 16064, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. Dept Of Defens...
false
full
2021-03-11T21:27:08.208Z
{ "id": 18, "name": "Information Disclosure" }
null
19
null
157,813
XSS on Meta Tag at https://m.olx.ph
2016-08-09T10:04:09.787Z
resolved
Hi, There is improper validation at q parameter on https://m.olx.ph/ where it can be manipulated by an attacker to include his/her XSS payload to execute javascript code. As example: ``https://m.olx.ph/all-results?q=0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgndGVzdDMnKTwvc2NyaXB0Pg" HTTP-EQUIV="refresh" a="a`` ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/150/f3874ccfe5a432c25e4443e62e72beed49ca425e_original.jpeg/ede8cd84a64d5392a2bb88ecb598721...
{ "awards_miles": false, "default_currency": "usd", "handle": "olx", "id": 8146, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "OLX is an online classifieds platform that ena...
false
full
2017-01-20T09:25:27.796Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
7
null
165,309
Subdomain Takeover in http://genghis-cdn.shopify.io/ pointing to Fastly
2016-09-02T15:25:15.655Z
resolved
Hi, I've found a Shopifu cdn domain here which had an instance of fastly setup but did not remove the dns record when the service was cancelled. a subdomain takeover similar to that of https://hackerone.com/reports/32825 could be possible. Vulnerable URL: http://genghis-cdn.shopify.io Page Response: ``` Fastly erro...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/017/146/bc97fcb48703e602e82e5ab47ccf42d1e3f0480a_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "shopify", "id": 1382, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Shopify is a multi-channel commerce platfor...
false
full
2016-09-06T15:46:49.314Z
null
null
22
null
204,568
stack trace exposed on https://receipts.uber.com/
2017-02-08T12:39:39.710Z
informative
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/mariogomez1", "username": "mariogomez1", "v...
{ "awards_miles": false, "default_currency": "usd", "handle": "uber", "id": 314, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Uber", "twitter_handle": ""...
false
no-content
2021-02-25T22:33:22.941Z
{ "id": 18, "name": "Information Disclosure" }
null
7
null
319,476
`whereis` concatenates unsanitized input into exec() command
2018-02-25T06:53:14.046Z
resolved
I would like to report command injection in `whereis` It allows to inject arbitrary shell commands by trying to locate crafted filenames. # Module **module name:** whereis **version:** 0.4.0 **npm page:** `https://www.npmjs.com/package/whereis` ## Module Description > Simply get the first path to a bin on any syste...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/068/907/abd483931dad2c93e376707dd59719cc277309cd_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "nodejs-ecosystem", "id": 23949, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "This program was used to handle v...
false
full
2018-03-28T06:17:58.607Z
{ "id": 58, "name": "Command Injection - Generic" }
null
9
{ "asset_identifier": "whereis", "asset_type": "SOURCE_CODE", "databaseId": 7254, "max_severity": "critical" }
145,495
nextcloud.com: Directory listening for 'wp-includes' forders
2016-06-17T18:02:13.368Z
resolved
Hello guys, **_Details:_** The web server is configured to display the list of files contained in this directory. As a result of a misconfiguration - end user / attacker able to see content of the folders with systemically important files **_Vulnerable place:_** /wp-includes directory when I tried to navigate to thi...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/003co5s7ttfbvqi1zah9g22ny3wm/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "nextcloud", "id": 13291, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Access, share and protect your files, ca...
false
full
2016-06-17T18:10:38.465Z
{ "id": 18, "name": "Information Disclosure" }
null
4
null
1,070,532
RCE Apache Struts2 remote command execution (S2-045) on [wifi-partner.mtn.com.gh]
2021-01-03T11:18:36.101Z
resolved
## Summary: A Remote Code Execution vulnerability exists in Apache Struts2 when performing file upload based on Jakarta Multipart parser. It is possible to perform a RCE attack with a malicious Content-Type value. If the Content-Type value isn't valid an exception is thrown which is then used to display an error messag...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/gce5nrtrsgkov7le19btk4ra2mhq/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "mtn_group", "id": 41919, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "MTN Group", "twitte...
false
full
2021-09-09T11:34:14.647Z
{ "id": 70, "name": "Code Injection" }
null
26
{ "asset_identifier": "mtn.com.gh", "asset_type": "URL", "databaseId": 34315, "max_severity": "critical" }
1,631,228
[demo.stripo.email] HTTP request Smuggling
2022-07-08T10:38:10.702Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/rshtzgfzd3aqze11wxoban88t79d/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "stripo", "id": 42368, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Stripo is a lightweight and intuitive emai...
false
no-content
2024-02-15T10:43:59.487Z
{ "id": 86, "name": "HTTP Request Smuggling" }
null
13
{ "asset_identifier": "stripo.email", "asset_type": "URL", "databaseId": 38701, "max_severity": "medium" }
221,264
stack overflow #3 in libsass
2017-04-15T18:47:12.337Z
resolved
`./sassc test387 /dev/null` triggers this stack overflow. ``` ==9081==ERROR: AddressSanitizer: stack-overflow on address 0x7fffb48eadc0 (pc 0x00000087a07b bp 0x7fffb48eba30 sp 0x7fffb48ead60 T0) #0 0x87a07a in Sass::Parser::parse_factor() /home/geeknik/libsass/src/parser.cpp:1379 #1 0x878304 in Sass::Parser::p...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/7xfGZCKCxUuGLYGfuUZM3XyY/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "libsass", "id": 2250, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "LibSass is a C/C++ port of the Sass engine...
false
full
2017-10-20T17:29:03.940Z
{ "id": 48, "name": "Uncontrolled Resource Consumption" }
null
3
null
1,551,591
CVE-2022-27776: Auth/cookie leak on redirect
2022-04-27T07:10:47.625Z
resolved
## Summary: curl/libcurl can be coaxed to leak Authorization / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privil...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/nyymi", "username": "nyymi", "verified": fa...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2022-04-29T06:32:42.601Z
{ "id": 87, "name": "Insufficiently Protected Credentials" }
null
22
{ "asset_identifier": "https://github.com/curl/curl", "asset_type": "SOURCE_CODE", "databaseId": 80985, "max_severity": "critical" }
46,818
Twitter Card - Parent Window Redirection
2015-02-05T22:56:25.001Z
resolved
Hi, I was trying to find XSS on another website and I finally did. After that I tried share this url on Twitter to show website owner, and noticed that I can run javascript on that iframe. Javascript that I used on Twitter Card : <script>top.window.location.href="https://google.com.tr"</script> You ca...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/013/030/9cd92c00a321c851be6949d9b7c7c031c13fef64_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "x", "id": 61, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "X helps you create and share ideas and information ...
true
full
2015-05-04T22:54:25.679Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
3
null
130,521
Unsubscribe any user from receiving email
2016-04-14T05:14:40.068Z
informative
hi, At url `https://www.uber.com/unsubscribe` you can unsubscribe any email of any user, which is bit of concern for the people who wants to receive emails from uber. only people who gets email from uber should be allowed to unsubscribe themselves from uber emails rather than anybody unsubscribing anyone Regards Ash...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/8yjzpineb8mc4wgnp84n16vuc9si/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "uber", "id": 314, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Uber", "twitter_handle": ""...
false
full
2016-06-13T23:01:27.510Z
{ "id": 57, "name": "Violation of Secure Design Principles" }
null
3
null
813,300
Changes to data in a CVE request after draft via GraphQL query
2020-03-08T20:42:00.136Z
resolved
## Summary: Our team has conducted a number of studies (tests) in the field of CVE Request. We found several statuses of such requests `Awaiting Publication`, `Pending HackerOne approval`, `Cancelled` . At the time of creating the request , we can change the data. However, we noticed that we can 't change them in othe...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/049/175/8449afdd3403f4de00b34719ee09823bad1c0a06_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "security", "id": 13, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Vulnerability disclosure should be safe, tra...
false
full
2020-05-15T17:23:49.575Z
{ "id": 106, "name": "Modification of Assumed-Immutable Data (MAID)" }
null
14
{ "asset_identifier": "hackerone.com", "asset_type": "URL", "databaseId": 3, "max_severity": "critical" }
2,190,117
File listing through scripts folder
2023-10-02T18:52:44.480Z
resolved
## Summary: It's possible to list all hidden files that are located within the TVAVirtual.com Sharepoint folder structure. ## Steps To Reproduce: 1. Navigate to TvaVirtual.com 2. Open the pages source code and notice that its build using sharepoint pages. 3. Confirm that you see a listing for /SiteAssets/Scripts/js.c...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/itssixtynein", "username": "itssixtynein", ...
{ "awards_miles": false, "default_currency": "usd", "handle": "tennessee-valley-authority", "id": 50979, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Tennes...
false
full
2024-02-09T12:12:41.419Z
{ "id": 126, "name": "File and Directory Information Exposure" }
null
40
{ "asset_identifier": "http://tvavirtual.com", "asset_type": "URL", "databaseId": 517799, "max_severity": "critical" }
1,586,524
installed.json sensitive file was publicly accessible on your web application which discloses information about authors and admins
2022-05-30T16:12:35.514Z
informative
##kindly if you don't accept this issue please close it as informative , thanks in advance ##Description: The installed.json file is a sensitive file and it was publicly accessible on your webserver , which discloses some information about your web site and users such as authors like admin as shown below: `"authors":...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/59qiti9oazy5hpff7s5iro3eg899/bbbf913458c48565d99f975f7ab9fc18ad1e989aa...
{ "awards_miles": false, "default_currency": "usd", "handle": "yelp", "id": 545, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Connecting people to great local businesses in ...
false
full
2022-10-22T18:39:33.897Z
{ "id": 18, "name": "Information Disclosure" }
null
4
{ "asset_identifier": "blog.yelp.com", "asset_type": "URL", "databaseId": 43921, "max_severity": "none" }
152,232
NULL Pointer Dereference in exif_process_user_comment
2016-07-19T07:55:52.244Z
resolved
There is a bug occur in exif_process_user_comment when trying to encode JIS string. ``` else if (!memcmp(szValuePtr, "JIS\0\0\0\0\0", 8)) { /* JIS should be tanslated to MB or we leave it to the user - leave it to the user */ *pszEncoding = estrdup((const char*)szValuePtr); szValuePtr = szValuePtr+8; ByteCo...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/074/688/42c5ca5265ff965283d70fc52df2681dfd648d44_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2016-08-30T18:58:10.546Z
{ "id": 2, "name": "Memory Corruption - Generic" }
null
2
{ "asset_identifier": "PHP", "asset_type": "OTHER", "databaseId": 84120, "max_severity": "none" }
1,072,078
[Java] CWE-555: Query to detect password in Java EE configuration files
2021-01-05T17:35:47.002Z
resolved
This bug was reported directly to GitHub Security Lab.
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/luchua", "username": "luchua", "verified": t...
{ "awards_miles": false, "default_currency": "usd", "handle": "github-security-lab", "id": 45140, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "GitHub Securit...
true
full
2021-01-05T17:37:43.287Z
null
null
38
null
480,778
Heap-buffer-overflow in Perl__byte_dump_string (utf8.c) could lead to memory leak
2019-01-16T08:31:57.672Z
resolved
With crafted regex match, I have found a heap-over-flow in function Perl__byte_dump_string, which would lead to memory leak. * Reported to the [Perl security mailing list](https://rt.perl.org/Public/Bug/Display.html?id=132063) on 11 Sep 2017. * Confirmed as a security flaw by TonyC on 24 Feb 2018 * CVE-2018-6797 assign...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/Md3sdzB9WvuY9YS5U39V4rEz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2019-10-24T20:57:47.575Z
{ "id": 9, "name": "Buffer Over-read" }
null
4
{ "asset_identifier": "Perl (Legacy)", "asset_type": "OTHER", "databaseId": 84128, "max_severity": "none" }
362,702
XSS in express-useragent through HTTP User-Agent
2018-06-06T11:28:49.469Z
informative
Hello, I would like to report an XSS in express-useragent module due a lack of validating User-Agent header. Please note I already created an [Github issue](https://github.com/biggora/express-useragent/issues/98) and asked for CVE ( [CVE-2018-9863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9863)). I ...
{ "cleared": false, "disabled": true, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/b9b86c2fc8409c628fb3de6", "username": "b9b86c2...
{ "awards_miles": false, "default_currency": "usd", "handle": "nodejs-ecosystem", "id": 23949, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "This program was used to handle v...
false
full
2018-07-06T13:34:36.850Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
3
{ "asset_identifier": "express-useragent", "asset_type": "SOURCE_CODE", "databaseId": 11571, "max_severity": "critical" }
226,211
SQL Injection vulnerability in a DoD website
2017-05-04T22:22:41.141Z
resolved
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/UzZ51ihxTiTDZzkEovExwXJn/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }, "...
{ "awards_miles": false, "default_currency": "usd", "handle": "deptofdefense", "id": 16064, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. Dept Of Defens...
false
no-content
2017-08-15T16:04:37.221Z
{ "id": 67, "name": "SQL Injection" }
null
2
null
887,818
[H1-2006 2020] I successfully solved it!
2020-05-31T08:44:50.216Z
resolved
Hello, I'll get post there the write-up soon. Here is flag: `^FLAG^736c635d8842751b8aafa556154eb9f3$FLAG$` Sincerely, @zeroxyele ## Impact null
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/bjo7gvfo868dynx0tje59p27ydpf/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd...
{ "awards_miles": false, "default_currency": "usd", "handle": "h1-ctf", "id": 46757, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Let's save the holidays together! #Togethe...
false
full
2020-06-18T01:04:08.535Z
null
null
64
{ "asset_identifier": "*.bountypay.h1ctf.com", "asset_type": "WILDCARD", "databaseId": 48138, "max_severity": "none" }
1,728,292
Cloudflare is not properly deleting user's account
2022-10-10T12:12:07.214Z
resolved
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/mlrhp2f8xo23h8qrwhp38hsai4gr/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "cloudflare", "id": 41, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Help us build a better Internet", "nam...
true
no-content
2023-04-13T11:49:34.588Z
{ "id": 65, "name": "Business Logic Errors" }
null
15
{ "asset_identifier": "dash.cloudflare.com", "asset_type": "URL", "databaseId": 92116, "max_severity": "critical" }
482,818
CSRF на лайк к отзыву (Pandao)
2019-01-20T09:32:17.101Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/ccy7tx9n4z5xw6hd4ko6ze3f3mva/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "mailru", "id": 65, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Building the Internet since 1998", "name"...
false
no-content
2019-03-11T13:06:32.907Z
{ "id": 45, "name": "Cross-Site Request Forgery (CSRF)" }
null
13
{ "asset_identifier": "*.pandao.ru", "asset_type": "URL", "databaseId": 21384, "max_severity": "critical" }
221,289
heap-use-after-free in Sass::SharedPtr::incRefCount()
2017-04-15T20:31:06.780Z
resolved
Feeding `@P#{()if(0,0<0,0)}` to `./sassc -s` triggers this use after free. ``` ==10210==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c00000a908 at pc 0x000000610a0f bp 0x7fff12af40d0 sp 0x7fff12af40c8 READ of size 8 at 0x60c00000a908 thread T0 #0 0x610a0e in Sass::SharedPtr::incRefCount() /home/geek...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/7xfGZCKCxUuGLYGfuUZM3XyY/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "libsass", "id": 2250, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "LibSass is a C/C++ port of the Sass engine...
false
full
2017-08-10T21:38:35.540Z
{ "id": 50, "name": "Use After Free" }
null
4
null
1,208,453
Account takeover through multistage CSRF at https://autochoice.fas.gsa.gov/AutoChoice/changeQAOktaAnswer and ../AutoChoice/changePwOktaAnswer
2021-05-25T12:08:45.244Z
resolved
Hi, Account takeover is possible through CSRF vulnerability at 'Change Security Question/Answer' & ' Change Password'. The endpoints - https://autochoice.fas.gsa.gov/AutoChoice/changeQAOktaAnswer & https://autochoice.fas.gsa.gov/AutoChoice/changePwOktaAnswer both are vulnerable to CSRF attack .==The CSRF token/or its...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/HSnGP4ZA9NoaVBJ9pAHjSPSQ/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "gsa_vdp", "id": 50553, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. General Services Adm...
false
full
2021-07-23T02:07:47.706Z
{ "id": 45, "name": "Cross-Site Request Forgery (CSRF)" }
null
30
{ "asset_identifier": "autochoice.fas.gsa.gov", "asset_type": "URL", "databaseId": 60003, "max_severity": "critical" }
2,065,306
odbc apache airflow provider code execution vulnerability
2023-07-12T11:23:41.417Z
resolved
In airflow.providers.odbc.hooks.odbc.OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution. Vulnerability reproduction steps: 1. get a malicious dynamic-link library drive...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/ge9nqc4uzovevjhsukseo1h76fhy/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2023-08-26T11:40:39.371Z
{ "id": 75, "name": "Privilege Escalation" }
null
9
{ "asset_identifier": "https://github.com/apache/airflow", "asset_type": "SOURCE_CODE", "databaseId": 86381, "max_severity": "critical" }
491,654
Image Injection vulnerability affecting www.rockstargames.com/careers may lead to Facebook OAuth Theft
2019-02-06T00:29:54.327Z
resolved
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/6vkmtgv1zjedvx3ssnhkcgoy22fm/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd7...
{ "awards_miles": false, "default_currency": "usd", "handle": "rockstargames", "id": 2143, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Publishers of such popular games as G...
true
no-content
2020-06-24T17:18:28.292Z
{ "id": 18, "name": "Information Disclosure" }
null
5
{ "asset_identifier": "www.rockstargames.com", "asset_type": "URL", "databaseId": 429, "max_severity": "critical" }
288,353
SMB SSRF in emblem editor exposes taketwo domain credentials, may lead to RCE
2017-11-08T12:03:34.372Z
resolved
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/c8iyhelw8y0ttcuqvcjjg48epadx/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "rockstargames", "id": 2143, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Publishers of such popular games as G...
true
no-content
2018-01-12T15:55:48.377Z
{ "id": 68, "name": "Server-Side Request Forgery (SSRF)" }
null
46
{ "asset_identifier": "socialclub.rockstargames.com", "asset_type": "URL", "databaseId": 430, "max_severity": "critical" }
1,489,141
ReDoS in Rack::Multipart
2022-02-22T22:34:07.597Z
resolved
Hello, I found ReDoS on Rack. I found this problem using `recheck` (https://makenowjust-labs.github.io/recheck/), a ReDoS detection tool. This tool has found multiple places where there seems to be a problem with the rack code, but since there are many and it takes time to check the behavior, I will first report on `...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/012/811/4b35334fa2fcf93b2e510174e09470fb42bbf03a_original.gif/9a55e00ecd2cdf18a7f40678e6836e4c...
{ "awards_miles": false, "default_currency": "usd", "handle": "rails", "id": 22, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Web development that doesn't hurt.", "name"...
false
full
2023-07-28T00:26:27.997Z
null
null
17
{ "asset_identifier": "https://github.com/rails/rails", "asset_type": "SOURCE_CODE", "databaseId": 160, "max_severity": "critical" }
118,950
Stored XSS
2016-02-26T14:05:13.563Z
resolved
Hello, I have found XSS on https://sandbox.veris.in/portal/members/ Steps to reproduce: 1. Sign in your Veris account. 2. Go to Member Book -> Add new member. 3. Fill this payload <svg onload=alert(1)> in "Name" and "Description" field. 4. Now visit https://sandbox.veris.in/portal/members/ or go to groups->Add me...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/017/083/1c184e3b6a29f0b62478ca965b448f9da3d27a1b_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "veris", "id": 9409, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Veris", "twitter_handle"...
false
full
2016-06-12T16:05:39.961Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
1
null
184,901
Stored cross site scripting (XSS) vulnerability on a DoD website
2016-11-24T16:31:12.309Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/048/674/a85d1f36a4d4b4c6269951bc913cc6f4fc3fcb23_original.JPG/cccd3716a6d2e06174d2a41492445cb1...
{ "awards_miles": false, "default_currency": "usd", "handle": "deptofdefense", "id": 16064, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. Dept Of Defens...
false
no-content
2017-06-23T14:57:29.853Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
4
null
824,909
Subdomain Takeover uptime
2020-03-19T21:29:44.357Z
resolved
Hello Team: i can't report it to the company so i hope to accept it as a valid bug , i found subdomain takeover in your subdomain ```uptime.btfs.io``` , i found this subdomain pointed to uptimerobot and not claimed so i signedup in uptimerobot and claimed it. POC: ------ 1 - open https://uptime.btfs.io/ 2 - you need...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/ks0roh96sguxe7eqbk2111otneg6/ede8cd84a64d5392a2bb88ecb598721116469c27c...
{ "awards_miles": false, "default_currency": "usd", "handle": "btfs", "id": 45735, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "BTFS", "twitter_handle": ...
true
full
2020-05-05T20:50:32.622Z
{ "id": 75, "name": "Privilege Escalation" }
null
13
null
384,472
Possible to Upload Local Arbitrary Private File to the Cloud against User's Will
2018-07-20T06:32:13.663Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/Tb1UbdfiVsp4Pd2TU49yQv9A/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "mailru", "id": 65, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Building the Internet since 1998", "name"...
true
no-content
2019-07-06T16:47:05.004Z
{ "id": 18, "name": "Information Disclosure" }
null
8
{ "asset_identifier": "ru.mail.cloud", "asset_type": "GOOGLE_PLAY_APP_ID", "databaseId": 240, "max_severity": "critical" }
38,345
[sms.qiwi.ru] XSS via Request-URI
2014-12-05T18:25:52.848Z
resolved
Сценарий https://sms.qiwi.ru/bo/reset/ выводит Request-URI без необходимых обработок. Эксплуатация возможно в браузере Internet Explorer через баг перенаправления (Request-URI будет послан без urlencode). PoC (IE) `http://blackfan.ru/x?r=https://sms.qiwi.ru/bo/reset/"><svg/onload=alert(document.domain)>/%252e%252e...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/205/e865d3ffcef54eba49cba80bd59502a347519715_original.jpeg/ede8cd84a64d5392a2bb88ecb598721...
{ "awards_miles": false, "default_currency": "usd", "handle": "qiwi", "id": 215, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The QIWI brand is a family brand that consolida...
true
full
2018-11-18T07:19:27.455Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
16
null
54,094
HTTP MitM on Flash Player settings manager allows attacker to set sandbox settings
2015-03-31T20:55:29.703Z
resolved
This vulnerability is present in both Google Chrome's PepperFlash aswell as browsers with the NPAPI Flash Player versions. It works by MITM'ing the Flashplayer settings manager. Although this settings manager is served over HTTPS, it is still possible to place or edit the local settings cookie by serving it over ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/2iouhy8utvcsxgio5i5yo90tqikz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2018-12-23T21:09:32.056Z
null
null
11
{ "asset_identifier": "IBB (Legacy)", "asset_type": "OTHER", "databaseId": 84122, "max_severity": "none" }
178,831
CSRF on signup endpoint (auto-api.yelp.com)
2016-10-29T14:59:58.731Z
resolved
Sign up request on https://auto-api.yelp.com/account/create_secure endpoint processes without any checking headers (without cookies, csrf tokens and even user-agent). This is sample HTML form: --- <html> <head></head> <body> <form action="https://auto-api.yelp.com/account/create_secur...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/120/171/30e412075c5d11dc8af7dcea30995ae6b611bd7b_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "yelp", "id": 545, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Connecting people to great local businesses in ...
true
full
2017-03-01T17:49:09.936Z
{ "id": 45, "name": "Cross-Site Request Forgery (CSRF)" }
null
12
null
159,955
integer overflow in bzdecompress caused heap corruption
2016-08-17T07:10:16.230Z
resolved
Please check: https://bugs.php.net/bug.php?id=72837
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/003/621/93eac54c6d663681d5f278d44e2f49570990cf5c_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2019-11-12T09:32:46.450Z
{ "id": 2, "name": "Memory Corruption - Generic" }
null
5
{ "asset_identifier": "PHP", "asset_type": "OTHER", "databaseId": 84120, "max_severity": "none" }
245,221
null pointer dereference and segfault in tile-count-merge
2017-07-02T00:41:36.403Z
resolved
This crash was triggered with `642f773 ` while fuzzing `tile-count-merge` with AFL on Debian 8 x64. `./tile-count-merge -o /dev/null test000` ``` ASAN:SIGSEGV ================================================================= ==10201==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000048d0af b...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/7xfGZCKCxUuGLYGfuUZM3XyY/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "mapbox", "id": 1366, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Mapbox is an open source mapping platform, p...
false
full
2017-07-11T15:36:07.317Z
{ "id": 51, "name": "NULL Pointer Dereference" }
null
4
null
36,459
Missing SPF header on revert.io
2014-11-17T23:09:18.039Z
resolved
Hi, I noticed that there is no TXT record containing a SPF header: #PoC ``` > dig TXT revert.io +short "google-site-verification=ix6OUwvbN9AJLTcdg3ulWcMibIWGgUy_zWEXrWeRYE4" ``` The [SPF Header](http://de.wikipedia.org/wiki/Sender_Policy_Framework) can be used to prevent phishers from impersonating you/you...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/001/637/e5a294547160a5c885e21dacc358769675c8b0e9_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "thisdata", "id": 557, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "ThisData is a cloud security service which...
false
full
2015-01-18T19:45:22.283Z
{ "id": 57, "name": "Violation of Secure Design Principles" }
null
1
null
52,181
Insecure Direct Object References that allows to read any comment (even if it should be private)
2015-03-16T11:56:07.679Z
resolved
Dear Vimeo Team, in combination with my previous bug i discovered that it was possible to read any comment on any video even if the video is private: I did a short POC on the Insecure Direct Object Reference. If an attacker wants to exploit this issue he has to know the ID of the comment, which looks like the ...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/ocb2n6ptlw1lh0t55azkm7x46mqk/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "vimeo", "id": 56, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Make life worth watching", "name": "Vimeo",...
true
full
2015-05-04T16:51:07.517Z
{ "id": 27, "name": "Improper Authentication - Generic" }
null
3
null
77,319
Full path disclosure at https://keybase.io/_/api/1.0/invitation_request.json
2015-07-21T13:27:47.914Z
resolved
When we send a POST-request to https://keybase.io/_/api/1.0/invitation_request.json with multiple __full_name__ parameters, for example: > email=test@testmail.com&full_name=1&full_name=2 we get an error response, which contains infromation about the server paths and code: > TypeError: Object 1,2 has no method ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/032/547/1d8b3feccf1a8281a2285cdbfc482aaf3b046b22_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "keybase", "id": 2809, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Keybase", "twitter_hand...
true
full
2015-09-04T18:16:23.265Z
{ "id": 18, "name": "Information Disclosure" }
null
2
null
1,630,668
CVE-2022-32213 - HTTP Request Smuggling Due to Flawed Parsing of Transfer-Encoding
2022-07-08T03:42:35.377Z
resolved
Original Report: https://hackerone.com/reports/1524555 ## Impact Depending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/q2hu1zvae85i18uspc1vkbpxwdbq/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd7...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2022-07-22T04:02:45.592Z
{ "id": 86, "name": "HTTP Request Smuggling" }
null
11
{ "asset_identifier": "https://github.com/nodejs/node", "asset_type": "SOURCE_CODE", "databaseId": 83651, "max_severity": "critical" }
1,337,351
BYPASSING COMMENTING ON RESTRICTED AUDIENCE VIDEOS
2021-09-12T06:31:11.027Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/boynamedboy", "username": "boynamedboy", "v...
{ "awards_miles": false, "default_currency": "usd", "handle": "tiktok", "id": 49708, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "TikTok", "twitter_handl...
true
no-content
2021-11-18T01:47:07.414Z
{ "id": 26, "name": "Improper Access Control - Generic" }
null
65
{ "asset_identifier": "*.tiktok.com", "asset_type": "URL", "databaseId": 50915, "max_severity": "critical" }
1,614,332
CVE-2022-32208: FTP-KRB bad message verification
2022-06-27T07:11:13.355Z
resolved
When curl does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client. ## Impact Loss of integrity of FTP-KRB transfers
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/nyymi", "username": "nyymi", "verified": fa...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2022-06-27T20:09:48.941Z
{ "id": 65, "name": "Business Logic Errors" }
null
7
{ "asset_identifier": "https://github.com/curl/curl", "asset_type": "SOURCE_CODE", "databaseId": 80985, "max_severity": "critical" }
83,667
apps.owncloud.com: Session Cookie in URL can be captured by hackers
2015-08-20T14:42:06.693Z
resolved
Session Cookie in URL URL: https://apps.owncloud.com/stories/feed+rss Issue detail The URL in the request appears to contain a PHP Session token within the query string: https://apps.owncloud.com/stories/feed+rss?id=42590&PHPSESSID=ee0624300266683a4625aabea344212a Issue background Sensitive informatio...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/003/791/220e701eb9be549162dfdb1da9b1a1b72ee2dd08_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "owncloud", "id": 3059, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "ownCloud GmbH is the company behind the ow...
false
full
2015-10-31T11:38:18.102Z
{ "id": 27, "name": "Improper Authentication - Generic" }
null
2
null
2,039,870
CVE-2023-32001: fopen race condition
2023-06-27T07:05:59.747Z
resolved
As we can see in the following curl code (line 59-61 https://github.com/curl/curl/blob/fb802b521af997230b65174a559f5c419520e142/lib/fopen.c ): ```C if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) { /* a non-regular file, fallback to direct fopen() */ *fh = fopen(filename, FOPEN_WRITETEXT); ... } ... ``...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/68gqya4e30aqvzh8b8hd08wrb0y4/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "curl", "id": 35663, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "cURL is an Open Source project providing a li...
false
full
2023-07-25T05:00:08.873Z
{ "id": 105, "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }
null
26
null
214,576
SIGABRT - mirb - Double Free
2017-03-18T23:26:46.437Z
resolved
PoC ------------------- Attached as test.rb Debug - mirb ------------------- x@x:~/Desktop/test/mruby/bin$ gdb -q ./mirb r Reading symbols from ./mirb...done. (gdb) r test.rb Starting program: /home/x/Desktop/test/mruby/bin/mirb test.rb mirb - Embeddable Interactive Ruby Shell NoMethodError: undefined method...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/ston3", "username": "ston3", "verified": fa...
{ "awards_miles": false, "default_currency": "usd", "handle": "shopify-scripts", "id": 15668, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "shopify-scripts", ...
true
full
2017-05-13T21:31:12.187Z
{ "id": 49, "name": "Double Free" }
null
5
null
906,790
Account Takeover on unverified emails in File Sync & Share
2020-06-24T11:47:00.171Z
resolved
## Summary The name change functionality in File Sync & Share is expected to change the name in File Sync & Share. But the API endpoint used in it also allows changing email to any email without having to verify the email. The login email stays the same but the email within File Sync & Share application changes to the ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/4um1gc3qqb0oavthynukysvj95hu/3c7b305354c9073c106ae3d1701798defaaf5be84...
{ "awards_miles": false, "default_currency": "usd", "handle": "acronis", "id": 13428, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Acronis sets the standard for cyber protec...
true
full
2021-06-16T18:26:18.227Z
{ "id": 57, "name": "Violation of Secure Design Principles" }
null
17
{ "asset_identifier": "beta-cloud.acronis.com", "asset_type": "URL", "databaseId": 13849, "max_severity": "critical" }
772,039
Same site Scripting
2020-01-11T03:52:50.245Z
resolved
Same site scripting I have found an error of some misconfigured DNS in a subdomain of yours which causes same site scripting. PoC 1 Open a terminal and type ping localhost.drive2.ru You would see that it resolves back to 127.0.0.1 A screenshot has been attached ## Impact This may cause security issues in multiple u...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/dre4dpir4terob3rts", "username": "dre4dpir4te...
{ "awards_miles": false, "default_currency": "usd", "handle": "drive_net_inc", "id": 14633, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "DRIVE.NET, Inc.", ...
false
full
2020-01-13T12:56:22.183Z
null
null
46
{ "asset_identifier": "api.drive2.ru", "asset_type": "URL", "databaseId": 30477, "max_severity": "critical" }
439,729
Add and Access to Labels of any Private Projects/Groups of Gitlab(IDOR)
2018-11-13T03:44:45.389Z
resolved
**Summary & Description : If you have a private project or private group then no non member should be able to access any information.But Adding Labels in your Private boards API request is vulnerable to IDOR attack which is leading to add private group/project labels and access it. ##Vulnerable Request for Project : ...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/QUAjqUf576QNBhxg691WB8YG/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }, "...
{ "awards_miles": false, "default_currency": "usd", "handle": "gitlab", "id": 264, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "A single application for the entire software ...
true
full
2019-09-19T19:25:06.817Z
{ "id": 55, "name": "Insecure Direct Object Reference (IDOR)" }
null
20
null
13,557
Leaking of password reset token through referer
2014-05-27T08:10:06.992Z
informative
When we request a password reset link, after that before Writing a new password, Going to an External link would cause Referer leakage... Remote Address:74.125.68.95:443 Request URL:https://fonts.googleapis.com/css?family=Open+Sans:400italic,700italic,400,700 Request Method:GET Status Code:200 OK Request Headers...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/jm049swxg6n10ucqpftu9cz4lpg5/ede8cd84a64d5392a2bb88ecb598721116469c27c015c2caa77148f11e211d58" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "factlink", "id": 3, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Share your knowledge with the world.", "...
false
full
2014-07-08T10:00:32.004Z
{ "id": 18, "name": "Information Disclosure" }
null
2
null
263,913
Content injection via URL parameter.
2017-08-28T10:48:54.517Z
duplicate
Hello, The following URL is vulnerable to content & code injection. https://labs.data.gov/dashboard/validate https://labs.data.gov/dashboard/validate?schema=federal-v1.1&output=browser&datajson_url=https%3A%2F%2Flabs.data.gov%2Fdashboard%2Ftest%2Cjson&qa=true&as_sfid=AAAAAAX9aAk4zbcmVPVmNqK8IsF4fTqp5MWg0dD5EUW_RUCLR...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/m12klxx9dpeftkwmqjbt6fg21h06/3c7b305354c9073c106ae3d1701798defaaf5be844...
{ "awards_miles": false, "default_currency": "usd", "handle": "gsa_bbp", "id": 50592, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "GSA Bounty", "twitter_...
false
full
2020-02-08T07:45:19.519Z
{ "id": 70, "name": "Code Injection" }
null
9
{ "asset_identifier": "labs.data.gov", "asset_type": "URL", "databaseId": 81476, "max_severity": "critical" }
1,217,702
Adam and the Deadly Injections
2021-06-04T17:42:52.214Z
resolved
Hi team adding the flag here ``` ███ ``` ████ I will do the writeup in the below comments before the deadline itself Thanks Akshansh ## Impact ....
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/Ghy55ytJLjJt7ZfRXk6jWyYz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "h1-ctf", "id": 46757, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Let's save the holidays together! #Togethe...
true
full
2021-06-18T04:58:09.641Z
{ "id": 8, "name": "Out-of-bounds Read" }
null
13
{ "asset_identifier": "*.ccc.h1ctf.com", "asset_type": "WILDCARD", "databaseId": 72510, "max_severity": "none" }
883,867
Inject page in admin panel via Shopify.API.pushState [New Payload]
2020-05-27T19:05:49.705Z
resolved
The correction for #868615, allows you to use new payload: ```js const ctx = window.open(location.origin+'/admin/themes', '_blank') const data = JSON.stringify({ message: 'Shopify.API.replaceState', data: {pathname: "abc:d../pages/xss#//"} }); ctx.postMessage(data) ``` ## Impact A...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/m8EUENYLU5dmCd7GCktjyfc8/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "shopify", "id": 1382, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Shopify is a multi-channel commerce platfor...
true
full
2020-12-27T22:14:47.302Z
{ "id": 63, "name": "Cross-site Scripting (XSS) - DOM" }
null
19
{ "asset_identifier": "your-store.myshopify.com", "asset_type": "URL", "databaseId": 413, "max_severity": "critical" }
838,510
user can bypass password enforcement when federated sharing is enabled
2020-04-03T21:34:58.933Z
resolved
If the admin forces password for link shares and federated shares are enabled, users can bypass this enforcement. Tested with Nextcloud 18.0.3 Steps to reproduce: - enable password enforcement for link shares as admin - as user1 create a link share with password - open the link share in a separate browser session a...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/michag86", "username": "michag86", "verifie...
{ "awards_miles": false, "default_currency": "usd", "handle": "nextcloud", "id": 13291, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Access, share and protect your files, ca...
true
full
2022-06-01T13:52:58.109Z
null
null
8
{ "asset_identifier": "nextcloud/server", "asset_type": "SOURCE_CODE", "databaseId": 13, "max_severity": "critical" }
1,188,725
No Valid SPF Records at sifchain.finance
2021-05-08T00:31:04.363Z
informative
Hello, There is any issue No valid SPF Records Desciprition : There is a email spoofing vulnerability.Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns be...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/oe4lrc71ykbzmo7891ic6f26cbf4/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "sifchain", "id": 51877, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The world's first omni-chain decentralize...
false
full
2021-12-09T17:51:42.789Z
{ "id": 57, "name": "Violation of Secure Design Principles" }
null
0
{ "asset_identifier": "https://github.com/sifchain/sifnode", "asset_type": "SOURCE_CODE", "databaseId": 61275, "max_severity": "critical" }
846,184
Blind SSRF at https://chat.makerdao.com/account/profile
2020-04-10T06:34:58.509Z
informative
{ "cleared": false, "disabled": true, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/losthacker", "username": "losthacker", "veri...
{ "awards_miles": false, "default_currency": "usd", "handle": "makerdao_bbp", "id": 38065, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "BlockDev Sp. Z o.o", ...
false
no-content
2020-04-14T11:32:49.287Z
{ "id": 68, "name": "Server-Side Request Forgery (SSRF)" }
null
6
{ "asset_identifier": "chat.makerdao.com", "asset_type": "URL", "databaseId": 36669, "max_severity": "critical" }
223,172
Просмотр привязного к странице email, всего лишь раз скомпрометировав письмо-уведомление
2017-04-23T10:21:33.090Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/nS7rNaLQVwztSp3zfcDqNCHF/9a55e00ecd2cdf18a7f40678e6836e4cdc90bf95eb4b50c43f5fb775da40bb65" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "vkcom", "id": 1254, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "VKontakte is the largest European social net...
true
no-content
2018-02-20T22:41:35.636Z
{ "id": 46, "name": "Privacy Violation" }
null
5
null
358,359
Privilage escalation with malicious .npmrc
2018-05-28T16:58:49.235Z
informative
Hello. I'm forwarding to you my conversation with npm staff regarding security issue. It allows to escalate to root privilages of victim using either: a) basic social engineering - convincing victim to run npm in attacker-controlled folder (eg. repository), including such innocent ones like "npm help" or "npm whoami"...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/ginden", "username": "ginden", "verified": ...
{ "awards_miles": false, "default_currency": "usd", "handle": "nodejs-ecosystem", "id": 23949, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "This program was used to handle v...
false
full
2018-06-30T14:34:57.891Z
{ "id": 75, "name": "Privilege Escalation" }
null
3
null
127,158
Possibility to get private email using UUID
2016-03-31T16:24:34.412Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/011/270/598dc823eda82bea7159c9f03f2a4bc32b174706_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "uber", "id": 314, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Uber", "twitter_handle": ""...
true
no-content
2016-06-15T16:51:10.222Z
{ "id": 18, "name": "Information Disclosure" }
null
82
null
235,605
Remote Code Execution (RCE) in DoD Websites
2017-06-01T20:39:34.131Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/146/816/bcf0f02fbb0a5629f13d893f184c2d982cfaeadf_original.jpeg/ede8cd84a64d5392a2bb88ecb598721...
{ "awards_miles": false, "default_currency": "usd", "handle": "deptofdefense", "id": 16064, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. Dept Of Defens...
false
no-content
2018-04-17T18:24:01.031Z
{ "id": 70, "name": "Code Injection" }
null
17
null
1,755,552
Exceed photo dimensions, Flickr.com
2022-10-30T17:02:31.378Z
informative
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/vb2e9xlf9ar9s98eqj06g9bfow5r/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "flickr", "id": 32982, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Flickr is a global community united by phot...
true
no-content
2022-11-07T17:53:25.895Z
null
null
7
{ "asset_identifier": "*.flickr.com", "asset_type": "WILDCARD", "databaseId": 14539, "max_severity": "critical" }
874,228
HTML Injection leads to XSS on███
2020-05-14T13:22:43.123Z
resolved
###Hello Team! ###I just found a HTML injection in subdomain████ that leads XSS with several payloads, let me show you the POC. ##POC 1 (Firefox 76) █████ --- ##POC 2 (Chrome 81) ███████ --- ## Impact An attacker could use the domain to trick users to execute malicious javascript code. ## Step-by-step Reprodu...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/v7w5tklrw2ko1z2m6tgjq9kxzus1/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "deptofdefense", "id": 16064, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. Dept Of Defens...
false
full
2020-07-30T17:46:24.596Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
4
null
283,644
Out-Of-Bounds Read in timelib_meridian()
2017-10-28T00:16:57.759Z
resolved
Description While deserializing an invalid dateTime value, wddx_deserialize() would result in a heap out-of-bounds read in timelib_meridian(). As wddx_deserialize() is exposed to network data, and sometimes echo the results back to client, this issue could potentially allow remote peeking of the process memory. It shou...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/xixabangm4", "username": "xixabangm4", "ver...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2019-10-14T04:38:08.877Z
{ "id": 9, "name": "Buffer Over-read" }
null
2
{ "asset_identifier": "PHP", "asset_type": "OTHER", "databaseId": 84120, "max_severity": "none" }