The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Commit 0/1 could not be created on the Hub (after 6 attempts).
Error code:   CreateCommitError

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

id
int64
title
string
created_at
string
substate
string
vulnerability_information
string
reporter
dict
team
dict
has_bounty?
bool
visibility
string
disclosed_at
string
weakness
dict
original_report_id
int64
vote_count
int64
structured_scope
dict
411,337
Forget password link not expiring after email change.
2018-09-19T05:13:33.396Z
resolved
I found a token miss configuration flaw in chaturbate.com, When we reset password for a user a link is sent to the registered email address but incase it remain unused and email is updated by user from setting panel then too that old token [reset link] sent at old email address remains valid. #A better explanation 1-...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/S6z7ivTTH8w7QA8J3RbpWRiM/9a55e00ecd2cdf18a7f40678e6836e4cdc90bf95eb4b50c43f5fb775da40bb65" }, "...
{ "awards_miles": false, "default_currency": "usd", "handle": "chaturbate", "id": 30475, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The largest online adult cam site", ...
true
full
2018-09-20T06:42:43.088Z
{ "id": 124, "name": "Improper Authorization" }
null
35
{ "asset_identifier": "chaturbate.com", "asset_type": "URL", "databaseId": 11722, "max_severity": "critical" }
311,805
Cross-origin resource sharing misconfig
2018-02-02T21:19:34.071Z
duplicate
Description An HTML5 cross-origin resource sharing (CORS) policy controls whether and how content running on other domains can perform two-way interaction with the domain that publishes the policy. The policy is fine-grained and can apply access controls per-request based on the URL and other features of the request. T...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/117/520/2ca445c24a43aa38ee4d5937857f7dcbfc4da97b_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "semrush", "id": 15966, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Online Visibility Management Platform.", ...
false
full
2018-03-13T14:23:52.379Z
{ "id": 27, "name": "Improper Authentication - Generic" }
193,559
3
null
385,322
Open API For Username enumeration
2018-07-23T07:32:50.020Z
not-applicable
We Can do username enumeration, Reproduce: 1. Go any wordpress site. #2.www.site.com/?author=1 (type ?author=1 at end of site) 3. You will get www.site.com/author/admin (now, admin is username of login panel of that site) Thanks, Sameer Phad ## Impact -
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/vwlss7nfxhq42yveh4jh6876myka/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "wordpress", "id": 55, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Beautiful sites of any kind.", "name": ...
false
full
2018-07-23T14:33:47.328Z
null
null
24
null
139,398
Read-Only user can execute arbitraty shell commands on AirOS
2016-05-17T17:47:16.026Z
resolved
This vulnerability is very similar to #128750, but it avoid the solution applied to the last beta XM firmware. In this report is used the last beta XM firmware: `XM.v6.0-beta9` # Vulnerability The vulnerability resides in the function `fetchCookies` file `remote.inc:117`. Just like last time is a non sanitization or ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/033/613/8c3e2d95cf9be1554d0d1e8de292b45c73325047_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "ui", "id": 800, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Ubiquiti Inc.", "twitter_hand...
true
full
2016-08-05T09:36:57.491Z
{ "id": 58, "name": "Command Injection - Generic" }
null
43
null
950,201
HTML Injection at "city-mobil.ru"
2020-08-03T13:31:55.282Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/CE24zD8tdJUYD6adpRS69L74/cccd3716a6d2e06174d2a41492445cb1d4bf85b4611a755bc810b9246a24d951" }, ...
{ "awards_miles": false, "default_currency": "usd", "handle": "mailru", "id": 65, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Building the Internet since 1998", "name"...
false
no-content
2020-12-15T16:14:10.375Z
{ "id": 61, "name": "Cross-site Scripting (XSS) - Reflected" }
null
11
{ "asset_identifier": "Citymobil", "asset_type": "OTHER", "databaseId": 40415, "max_severity": "critical" }
488,371
Insecure Storage and Overly Permissive Google Maps API Key in Android App
2019-01-30T07:12:30.259Z
resolved
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/481/462/6495338f139b675efd88bbc4412fc76613b6df30_original.jpg/3c7b305354c9073c106ae3d1701798def...
{ "awards_miles": false, "default_currency": "usd", "handle": "mailru", "id": 65, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Building the Internet since 1998", "name"...
true
no-content
2019-09-01T12:49:10.910Z
{ "id": 101, "name": "Insecure Storage of Sensitive Information" }
null
10
{ "asset_identifier": "ru.mail.cloud", "asset_type": "GOOGLE_PLAY_APP_ID", "databaseId": 240, "max_severity": "critical" }
272,588
CSRF in Raffles Ticket Purchasing
2017-09-28T04:08:10.330Z
resolved
Description: ======== An API endpoint get executed with no CSRF prevention, the endpoint did not verify session_id required in the post form. An attacker can crafted malicious form (Poc), which is executed by authenticated user action leading to huge balance lost. Poc: === <!doctype html> <html> <head> </head> <bod...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/137/533/339f440fdc61b6dfeb663c8216d249618b8fd451_original.gif/9a55e00ecd2cdf18a7f40678e6836e4cd...
{ "awards_miles": false, "default_currency": "usd", "handle": "unikrn", "id": 2672, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "unikrn offers a world class comprehensive es...
true
full
2018-04-10T02:10:08.175Z
{ "id": 45, "name": "Cross-Site Request Forgery (CSRF)" }
null
19
{ "asset_identifier": "unikrn.com", "asset_type": "URL", "databaseId": 453, "max_severity": "critical" }
1,047,447
HostAuthorization middleware does not suitably sanitize the Host / X-Forwarded-For header allowing redirection.
2020-11-30T23:25:50.430Z
resolved
When a site is configured to use the `.tkte.ch` (leading dot) short form for domain name, ex: ```ruby config.hosts << '.tkte.ch' ``` it is then sanitized in sanitize_string, where it is turned into a regex: ```ruby def sanitize_string(host) if host.start_with?(".") /\A(.+\.)?#{Regexp.e...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/tktech", "username": "tktech", "verified": ...
{ "awards_miles": false, "default_currency": "usd", "handle": "rails", "id": 22, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Web development that doesn't hurt.", "name"...
true
full
2021-02-11T01:39:07.028Z
{ "id": 53, "name": "Open Redirect" }
null
7
{ "asset_identifier": "https://github.com/rails/rails", "asset_type": "SOURCE_CODE", "databaseId": 160, "max_severity": "critical" }
1,406,495
Ability to Disable the Login Attempt of any Shopify Owner for 24 hrs (Zero_Click)
2021-11-21T14:12:27.876Z
resolved
Hello Team, I Found a Bug in which Hacker Have Ability to Disable the Login Attempt of any Shopify Owner With (Zero_Click) Summary: ---------- Proof of Concept; ------------------- Credentials: ------------- Victim = ███████.com (████████) Hacker = █████████.com Victim Sceanrio: ----------------- Step 1 : Victi...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/hdt3mtd2ifw3l8eghlc8ks1z9u0j/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "shopify", "id": 1382, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Shopify is a multi-channel commerce platfor...
true
full
2022-02-15T06:20:35.527Z
{ "id": 102, "name": "Client-Side Enforcement of Server-Side Security" }
null
57
{ "asset_identifier": "accounts.shopify.com", "asset_type": "URL", "databaseId": 423, "max_severity": "critical" }
1,927,480
DiffieHellman doesn't generate keys after setting a key
2023-03-31T13:33:05.838Z
resolved
DiffieHellman doesn't generate keys after setting a key ## Steps To Reproduce: 1. Instantiate: `const dh = crypto.createDiffieHellman(1024);` 2. Set private key: ``` //set private key to 2 dh.setPrivateKey(Buffer.from("02", 'hex')); //outputs 02 (as expected) console.log(dh.getPrivateKey().toString('hex'...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/7v1s2nnar9u3rbd28col4xwngzgi/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "nodejs", "id": 22984, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Node.js JavaScript Runtime", "name"...
false
full
2023-07-20T20:59:27.162Z
{ "id": 227, "name": "Inconsistency Between Implementation and Documented Design" }
null
7
{ "asset_identifier": "https://github.com/nodejs/node", "asset_type": "SOURCE_CODE", "databaseId": 666, "max_severity": "critical" }
94,230
Cross-site Scripting in all Zopim
2015-10-16T14:56:26.648Z
resolved
Hello. This vulnerability works on all sites where there Zopim chat. Vulnerable link: https://www.zopim.com/#1=1&__zopim_widget_proxy=1.zopim.com/s/W/xdds/PIJ4+155G8p7LL3w/c/1444997086678%22%3E%3C/script%3E%3Csvg/onload=alert%28%22XSS%22%29%3E Vulnerable param is __zopim_widget_proxy. For XSS i used "></script><svg/onl...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/038/696/21beef0c831766fad769a95c8f2a66692c65dfc9_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "zendesk", "id": 205, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Zendesk is a leading cloud-based customer se...
true
full
2015-10-20T22:53:27.181Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
2
null
1,137,218
Access control issue on invoice documents downloading feature.
2021-03-26T13:17:25.719Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/icsb2flpwf8cufoi8q8sgdpeaxw4/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "moneybird", "id": 1361, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Cloud accounting", "name": "Moneybird...
true
no-content
2021-04-01T14:16:18.532Z
{ "id": 26, "name": "Improper Access Control - Generic" }
null
26
{ "asset_identifier": "moneybird.com", "asset_type": "URL", "databaseId": 16186, "max_severity": "critical" }
1,474,536
connect.8x8.com: admin user can send invites on behalf of another admin user via POST /api/v1/users/<User ID>/invites
2022-02-08T16:13:35.632Z
resolved
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/ni07o23q7345senc7og6vhuqpkab/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" },...
{ "awards_miles": false, "default_currency": "usd", "handle": "8x8-bounty", "id": 49732, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "8x8 Bounty", "twitt...
true
no-content
2023-02-15T07:48:12.281Z
{ "id": 26, "name": "Improper Access Control - Generic" }
null
94
{ "asset_identifier": "connect.8x8.com", "asset_type": "URL", "databaseId": 61539, "max_severity": "critical" }
53,088
SSRF vulnerability (access to metadata server on EC2 and OpenStack)
2015-03-23T15:08:49.061Z
resolved
In bug [#50537](https://hackerone.com/reports/50537), **haquaman** reported a SSRF vulnerability in the meme creation section of Phabricator. Ticket [T6755](https://secure.phabricator.com/T6755) was created and the HackerOne issue was closed as "Won't fix". [T6755](https://secure.phabricator.com/T6755) states that *...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/223/9346bb3a772b6433536cfbbe2a0a6c4c7a786fe9_original.jpg/3c7b305354c9073c106ae3d1701798def...
{ "awards_miles": false, "default_currency": "usd", "handle": "phabricator", "id": 18, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Phabricator is a collection of open sourc...
true
full
2015-03-26T18:37:57.571Z
{ "id": 18, "name": "Information Disclosure" }
null
4
null
237,071
X-Frame-Options
2017-06-06T01:35:07.815Z
informative
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/154/935/5f618f48ba808be6d0258844f8d8922dad9c86eb_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "coinbase", "id": 104, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Creating an open financial system for the w...
false
no-content
2017-06-22T17:07:14.836Z
{ "id": 74, "name": "UI Redressing (Clickjacking)" }
null
1
null
14,494
Clickjacking & CSRF attack can be done at https://app.mavenlink.com/login
2014-06-02T22:25:15.066Z
resolved
Hello, My name is Vineet bhardwaj. i am security researcher and i pen test your website( https://app.mavenlink.com/login) and i found there is click jacking attack and CSRF attack can be done. POC: <html><head> <title> CSRF testing </title> <style> frame { opacity: 0.5; border: none; position: absolute...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/006/510/7f9f38ce92d31dade42f9ff5a8bb1ba4c02204a6_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "mavenlink", "id": 48, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Mavenlink provides sophisticated software a...
false
full
2014-09-19T15:35:11.812Z
{ "id": 45, "name": "Cross-Site Request Forgery (CSRF)" }
null
2
null
50,776
A user can edit comments even after video comments are disabled
2015-03-10T09:12:26.084Z
resolved
A user can escalate privileges and edit his previous comments, when comments are disabled for a video. Steps to verify: 1. Log into vimeo.com as Alice. Upload a video (say, video id - 118026546) and allow anyone to leave comments for that video . 2. Login as Bob and navigate to the video URL - https://vimeo.com/11...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/001/170/fc657d5dfd17ac30235e5687c8b2d9b461e0f64e_original.jpg/3c7b305354c9073c106ae3d1701798def...
{ "awards_miles": false, "default_currency": "usd", "handle": "vimeo", "id": 56, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Make life worth watching", "name": "Vimeo",...
true
full
2015-03-11T14:37:33.636Z
{ "id": 75, "name": "Privilege Escalation" }
null
2
null
901,210
Redmin API Key Exposed In GIthub
2020-06-18T03:11:38.534Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/f5nhz1d1xaxs3tetz8pan9scp2dz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "mailru", "id": 65, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Building the Internet since 1998", "name"...
true
no-content
2020-11-25T15:58:05.827Z
{ "id": 18, "name": "Information Disclosure" }
null
20
{ "asset_identifier": "Foodplex", "asset_type": "OTHER", "databaseId": 49351, "max_severity": "critical" }
395,944
Reflected XSS in the npm module express-cart.
2018-08-16T11:34:50.254Z
resolved
> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report! I would like to report Reflected XSS in the npm module...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/avi3719", "username": "avi3719", "verified"...
{ "awards_miles": false, "default_currency": "usd", "handle": "nodejs-ecosystem", "id": 23949, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "This program was used to handle v...
false
full
2019-02-15T06:25:38.924Z
{ "id": 61, "name": "Cross-site Scripting (XSS) - Reflected" }
null
15
{ "asset_identifier": "express-cart", "asset_type": "SOURCE_CODE", "databaseId": 10291, "max_severity": "critical" }
1,067,004
Sensitive data exposure via https://███████/secure/QueryComponent!Default.jspa - CVE-2020-14179
2020-12-27T13:46:56.469Z
resolved
##Summary: Information Disclosure vulnerability in outdated Jira. ##Description: Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa en...
{ "cleared": false, "disabled": true, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/ba56adcb299ff13a87475bf", "username": "ba56adc...
{ "awards_miles": false, "default_currency": "usd", "handle": "deptofdefense", "id": 16064, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. Dept Of Defens...
false
full
2021-01-12T21:43:53.661Z
{ "id": 18, "name": "Information Disclosure" }
null
3
null
1,569,926
Credential leak when use two url
2022-05-13T19:09:38.556Z
not-applicable
## Summary: Curl can leak user credentials if use two url. ## Steps To Reproduce: 1. curl -I -v -u aaa:bbb hackerone.com curl.se 2. the output is: > Connected to hackerone.com (104.16.100.52) port 80 (#0) > Server auth using Basic with user 'aaa' ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/liang1", "username": "liang1", "verified": ...
{ "awards_miles": false, "default_currency": "usd", "handle": "curl", "id": 35663, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "cURL is an Open Source project providing a li...
false
full
2022-06-27T06:55:01.273Z
{ "id": 87, "name": "Insufficiently Protected Credentials" }
null
2
{ "asset_identifier": "https://github.com/curl/curl", "asset_type": "SOURCE_CODE", "databaseId": 18844, "max_severity": "critical" }
67,929
Redirection Page throwing error instead of redirecting to site
2015-06-14T18:45:01.721Z
resolved
Hello I was just testing and found that http://anysite.com.com/index.php?ref=&quot;&gt;&lt;svg/onload=window.onerror=alert;throw/XSS/;// does not shows the usual External link warning page, but shows some error page . Thanks
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/003/771/41805267a81081c293979a5dbc0599bcc4af3ac2_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "security", "id": 13, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Vulnerability disclosure should be safe, tra...
false
full
2016-05-25T02:13:58.505Z
{ "id": 57, "name": "Violation of Secure Design Principles" }
null
3
null
681,468
The password recovery let users know whether an email address exists or not in the website
2019-08-25T00:03:13.241Z
resolved
URL: https://apps.nextcloud.com/password/reset/ I have tried to recover the password for some emails: test@test.com (exists) teste@teste.com.br (does not exists) After I clicked the "reset my password"'s button, the website informed that the email did not exist. ## Impact This is a bad practice, and it is an invit...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/m4eqwpxb19wtullkuv0b4hno7cd6/3c7b305354c9073c106ae3d1701798defaaf5be84...
{ "awards_miles": false, "default_currency": "usd", "handle": "nextcloud", "id": 13291, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Access, share and protect your files, ca...
false
full
2019-11-22T17:51:03.959Z
{ "id": 31, "name": "Improper Restriction of Authentication Attempts" }
null
10
{ "asset_identifier": "apps.nextcloud.com", "asset_type": "URL", "databaseId": 42, "max_severity": "critical" }
2,012,135
[CVE-2023-22799] Possible ReDoS based DoS vulnerability in GlobalID
2023-06-04T08:02:09.284Z
resolved
I made a report and patch at https://hackerone.com/reports/1696752. https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127 > There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expr...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/012/811/4b35334fa2fcf93b2e510174e09470fb42bbf03a_original.gif/9a55e00ecd2cdf18a7f40678e6836e4c...
{ "awards_miles": false, "default_currency": "usd", "handle": "ibb", "id": 54349, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The Internet Bug Bounty rewards security resea...
true
full
2023-07-27T06:45:30.531Z
{ "id": 48, "name": "Uncontrolled Resource Consumption" }
null
4
{ "asset_identifier": "https://github.com/rails", "asset_type": "SOURCE_CODE", "databaseId": 80881, "max_severity": "critical" }
872,190
Plaintext storage of a password on kubernetes release bucket
2020-05-12T19:19:27.083Z
informative
Report Submission Form ## Summary: During my recon I found these two buckets dl.k8s.io and dl.kubernetes.io which actually redirects to https://storage.googleapis.com/kubernetes-release/. By searching the string "password" under https://storage.googleapis.com/kubernetes-release/ I found a file called rsyncd.password (...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/NyGLUvi87hCNJqmipxC5NVtJ/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }, "...
{ "awards_miles": false, "default_currency": "usd", "handle": "kubernetes", "id": 39386, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Kubernetes", "twitt...
false
full
2021-01-07T18:30:33.292Z
{ "id": 21, "name": "Plaintext Storage of a Password" }
null
0
{ "asset_identifier": "k8s.io", "asset_type": "URL", "databaseId": 34429, "max_severity": "critical" }
304,708
Information exposure via error pages (www.lahitapiola.fi Tomcat)
2018-01-14T11:59:38.299Z
resolved
**Summary:** Information exposure via error pages **Description:** Hello there! I take the risk that this report might be closed as a N/A but because you are running outdated tomcat I wanted to take this risk and report this to you. So here we go.. When you navigate to the page e.g. https://www.lahitapiola.fi/cs/S...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/qnaqvuyajxqzh6ms6m1hih7hedxw/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd7...
{ "awards_miles": false, "default_currency": "usd", "handle": "localtapiola", "id": 8416, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "LocalTapiola’s products and services c...
true
full
2018-03-02T04:59:45.904Z
{ "id": 82, "name": "Information Exposure Through an Error Message" }
null
6
{ "asset_identifier": "www.lahitapiola.fi", "asset_type": "URL", "databaseId": 1045, "max_severity": "critical" }
1,984,060
After the upload of an private file, using transformations, the file becomes public without the possibility of changing it.
2023-05-11T14:54:33.064Z
resolved
## Summary: When an user uploads a private file, ex (Screenshot 1), where only he has access to. Using the "View transformations" function can generate different kinds of image transformations (Screenshot 2). But after the generation of that transformation for example clicking on the regenerate button next to profile....
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/limusec", "username": "limusec", "verified"...
{ "awards_miles": false, "default_currency": "usd", "handle": "mozilla", "id": 61236, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Mozilla web bug bounty program specific to...
true
full
2023-10-20T09:37:30.009Z
{ "id": 26, "name": "Improper Access Control - Generic" }
null
54
{ "asset_identifier": "phabricator.allizom.org", "asset_type": "URL", "databaseId": 635518, "max_severity": "critical" }
1,068,934
[h1ctf-Grinch Networks] MrR3b00t Saving the Christmas
2020-12-30T19:02:05.093Z
resolved
> Disclaimer: Certain things are a bit modified to set the pieces for the story. Also you can find the flags for all 12 challenges in file F1138300 , Now enjoy :) ``` █▀▄▀█ █▀█ ░ █▀█ █▄▄ █▀█ █▀█ ▀█▀ █░▀░█ █▀▄ ▄ █▀▄ █▄█ █▄█ █▄█ ░█░ saves the Christmas ``` **_Episode - 0x00_ Pil0t.py** It was a gloomy clear night, Mr....
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/WVQ792pdimTiEpL8JcJVzyrn/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }, "...
{ "awards_miles": false, "default_currency": "usd", "handle": "h1-ctf", "id": 46757, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Let's save the holidays together! #Togethe...
false
full
2021-01-11T22:36:53.487Z
null
null
2
{ "asset_identifier": "*.hackyholidays.h1ctf.com", "asset_type": "WILDCARD", "databaseId": 59882, "max_severity": "critical" }
296,622
Blind XXE on pu.vk.com
2017-12-10T01:18:27.212Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/136/191/5e385ddcb9022257bb238b1bba3a1683a75e57e3_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "vkcom", "id": 1254, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "VKontakte is the largest European social net...
true
no-content
2018-03-04T13:15:15.979Z
{ "id": 54, "name": "XML External Entities (XXE)" }
null
16
null
574,638
Lack of proper paymentProfileUUID validation allows any number of free rides without any outstanding balance
2019-05-08T23:55:03.051Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/eequalsmc2", "username": "eequalsmc2", "ver...
{ "awards_miles": false, "default_currency": "usd", "handle": "uber", "id": 314, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Uber", "twitter_handle": ""...
true
no-content
2019-07-18T01:44:08.187Z
{ "id": 65, "name": "Business Logic Errors" }
null
75
null
181,803
SQL Injection /webApp/oma_conf ctx parameter (viestinta.lahitapiola.fi)
2016-11-12T17:58:34.924Z
resolved
**Vulnerable script**: /webApp/oma_conf **Vulnerable parameter**: ctx[vars][email] **Database**: PostgreSQL **PoC** ```http POST /webApp/oma_conf HTTP/1.1 Host: viestinta.lahitapiola.fi Content-Type: application/x-www-form-urlencoded Content-Length: 1131 ctx=%3Cctx+lang%3D%22en%22+date%3D%222016-11-12T17%3A33%3A06Z%2...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/205/e865d3ffcef54eba49cba80bd59502a347519715_original.jpeg/ede8cd84a64d5392a2bb88ecb598721...
{ "awards_miles": false, "default_currency": "usd", "handle": "localtapiola", "id": 8416, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "LocalTapiola’s products and services c...
true
full
2016-12-08T13:19:18.694Z
{ "id": 67, "name": "SQL Injection" }
null
50
null
470,398
Local privilege escalation bug using Keybase redirector on macOS
2018-12-20T21:33:40.369Z
resolved
There's a local privilege escalation bug in the latest version of Keybase for macOS. The issue is in the process of launching `keybase-redirector`. The process works as follows: 1. Copy `keybase-redirector` binary to a root-only location 2. Check its signature 3. Launch the binary [Code ref](https://github.com/keyba...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/votava", "username": "votava", "verified": ...
{ "awards_miles": false, "default_currency": "usd", "handle": "keybase", "id": 2809, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Keybase", "twitter_hand...
true
full
2019-01-30T18:15:40.373Z
{ "id": 75, "name": "Privilege Escalation" }
null
23
null
245,296
Persistent XSS on keybase.io via "payload" field in `/user/sigchain_signature.toffee` template
2017-07-02T09:42:52.752Z
resolved
## Issue Keybase allows you to see other users' sigchains by navigating to <https://keybase.io/<username\>/sigchain>. The "Payload" field containing JSON related to the chainlink on the right side of the page is not correctly escaped during templating, leading to a persistent XSS as users have a high degree of control...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/447/d7846c3a70ff69fbfa83f43531b3ca68c55545df_original.JPG/cccd3716a6d2e06174d2a41492445cb1...
{ "awards_miles": false, "default_currency": "usd", "handle": "keybase", "id": 2809, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Keybase", "twitter_hand...
true
full
2019-03-14T15:15:33.139Z
{ "id": 62, "name": "Cross-site Scripting (XSS) - Stored" }
null
265
null
418,145
No rate limiting in changing room subject.
2018-10-03T12:23:54.508Z
resolved
Before i shed more light on this: I noticed i can create over 200 apps but i don't really know how valid that was. I want to report that there is no rate limiting in changing room subject. Attacker scenrio: 1. Navigate to https://chaturbate.com/b/your username 2. Try to create a room subject and capture the request. 3...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/cunn", "username": "cunn", "verified": fals...
{ "awards_miles": false, "default_currency": "usd", "handle": "chaturbate", "id": 30475, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "The largest online adult cam site", ...
true
full
2018-10-09T03:59:44.566Z
null
null
18
{ "asset_identifier": "chaturbate.com", "asset_type": "URL", "databaseId": 11722, "max_severity": "critical" }
238,915
Text injection on status.algolia.com
2017-06-11T06:55:15.028Z
resolved
Hi Algolia team! I just found a text injection vulnerabilty in [status.algolia.com/clusters](https://status.algolia.com/clusters/) . Please follow the steps below. **Vulnerable URL** [status.algolia.com](https://status.algolia.com/clusters/) Steps to reproduce: * Go to [Vulnerable URL](https://status.algolia.com/c...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/111/452/3910a59fc37678124c0b2592126ea98758c2eb43_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "algolia", "id": 443, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Hosted search API that delivers instant and ...
false
full
2017-08-25T10:17:57.962Z
{ "id": 57, "name": "Violation of Secure Design Principles" }
null
3
null
7,898
Persistent Cross-site scripting vulnerability settings.
2014-04-17T19:29:03.968Z
resolved
Hello, I created an account with as group name `"><img src=x onerror=alert(4)>`, after that I went to settings and found a Cross-site scripting vulnerability located at that page. The url for me : https://app.respond.ly/6sjp/settings/account I have a proof of concept in the attachment. best regards Olivi...
{ "cleared": true, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/000/045/1828acf6bd0443abccd1796fb54be386d874708c_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca1...
{ "awards_miles": false, "default_currency": "usd", "handle": "respondly", "id": 128, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Team Inbox for Email & Twitter", "nam...
false
full
2014-04-21T16:31:16.010Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
1
null
1,106,009
critical information disclosure
2021-02-17T22:01:23.421Z
resolved
##Description: hey all , I have found critical information through this endpoint /██████; this endpoint contains all env vars used in a www.██████ such as server credentials, db ,mail , twitter client_id and client_secret , facebook client_id and client_secret, etc... ## Impact full access control on every servi...
{ "cleared": false, "disabled": true, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/ba56adcb299ff13a87475bf", "username": "ba56adc...
{ "awards_miles": false, "default_currency": "usd", "handle": "deptofdefense", "id": 16064, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "U.S. Dept Of Defens...
false
full
2021-03-11T21:27:08.208Z
{ "id": 18, "name": "Information Disclosure" }
null
19
null
157,813
XSS on Meta Tag at https://m.olx.ph
2016-08-09T10:04:09.787Z
resolved
Hi, There is improper validation at q parameter on https://m.olx.ph/ where it can be manipulated by an attacker to include his/her XSS payload to execute javascript code. As example: ``https://m.olx.ph/all-results?q=0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgndGVzdDMnKTwvc2NyaXB0Pg" HTTP-EQUIV="refresh" a="a`` ...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/002/150/f3874ccfe5a432c25e4443e62e72beed49ca425e_original.jpeg/ede8cd84a64d5392a2bb88ecb598721...
{ "awards_miles": false, "default_currency": "usd", "handle": "olx", "id": 8146, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "OLX is an online classifieds platform that ena...
false
full
2017-01-20T09:25:27.796Z
{ "id": 60, "name": "Cross-site Scripting (XSS) - Generic" }
null
7
null
165,309
Subdomain Takeover in http://genghis-cdn.shopify.io/ pointing to Fastly
2016-09-02T15:25:15.655Z
resolved
Hi, I've found a Shopifu cdn domain here which had an instance of fastly setup but did not remove the dns record when the service was cancelled. a subdomain takeover similar to that of https://hackerone.com/reports/32825 could be possible. Vulnerable URL: http://genghis-cdn.shopify.io Page Response: ``` Fastly erro...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/017/146/bc97fcb48703e602e82e5ab47ccf42d1e3f0480a_original.jpg/3c7b305354c9073c106ae3d1701798de...
{ "awards_miles": false, "default_currency": "usd", "handle": "shopify", "id": 1382, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Shopify is a multi-channel commerce platfor...
false
full
2016-09-06T15:46:49.314Z
null
null
22
null
204,568
stack trace exposed on https://receipts.uber.com/
2017-02-08T12:39:39.710Z
informative
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png" }, "url": "/mariogomez1", "username": "mariogomez1", "v...
{ "awards_miles": false, "default_currency": "usd", "handle": "uber", "id": 314, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "Uber", "twitter_handle": ""...
false
no-content
2021-02-25T22:33:22.941Z
{ "id": 18, "name": "Information Disclosure" }
null
7
null
319,476
`whereis` concatenates unsanitized input into exec() command
2018-02-25T06:53:14.046Z
resolved
I would like to report command injection in `whereis` It allows to inject arbitrary shell commands by trying to locate crafted filenames. # Module **module name:** whereis **version:** 0.4.0 **npm page:** `https://www.npmjs.com/package/whereis` ## Module Description > Simply get the first path to a bin on any syste...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/000/068/907/abd483931dad2c93e376707dd59719cc277309cd_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca...
{ "awards_miles": false, "default_currency": "usd", "handle": "nodejs-ecosystem", "id": 23949, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "This program was used to handle v...
false
full
2018-03-28T06:17:58.607Z
{ "id": 58, "name": "Command Injection - Generic" }
null
9
{ "asset_identifier": "whereis", "asset_type": "SOURCE_CODE", "databaseId": 7254, "max_severity": "critical" }
145,495
nextcloud.com: Directory listening for 'wp-includes' forders
2016-06-17T18:02:13.368Z
resolved
Hello guys, **_Details:_** The web server is configured to display the list of files contained in this directory. As a result of a misconfiguration - end user / attacker able to see content of the folders with systemically important files **_Vulnerable place:_** /wp-includes directory when I tried to navigate to thi...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/003co5s7ttfbvqi1zah9g22ny3wm/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "nextcloud", "id": 13291, "offers_bounties": true, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Access, share and protect your files, ca...
false
full
2016-06-17T18:10:38.465Z
{ "id": 18, "name": "Information Disclosure" }
null
4
null
1,070,532
RCE Apache Struts2 remote command execution (S2-045) on [wifi-partner.mtn.com.gh]
2021-01-03T11:18:36.101Z
resolved
## Summary: A Remote Code Execution vulnerability exists in Apache Struts2 when performing file upload based on Jakarta Multipart parser. It is possible to perform a RCE attack with a malicious Content-Type value. If the Content-Type value isn't valid an exception is thrown which is then used to display an error messag...
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/gce5nrtrsgkov7le19btk4ra2mhq/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "mtn_group", "id": 41919, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "", "name": "MTN Group", "twitte...
false
full
2021-09-09T11:34:14.647Z
{ "id": 70, "name": "Code Injection" }
null
26
{ "asset_identifier": "mtn.com.gh", "asset_type": "URL", "databaseId": 34315, "max_severity": "critical" }
1,631,228
[demo.stripo.email] HTTP request Smuggling
2022-07-08T10:38:10.702Z
resolved
{ "cleared": false, "disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": { "small": "https://profile-photos.hackerone-user-content.com/variants/rshtzgfzd3aqze11wxoban88t79d/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c" }...
{ "awards_miles": false, "default_currency": "usd", "handle": "stripo", "id": 42368, "offers_bounties": false, "only_cleared_hackers": false, "pentest_feature_enabled?": false, "pentest_retesting_ends_at": null, "permissions": [], "profile": { "about": "Stripo is a lightweight and intuitive emai...
false
no-content
2024-02-15T10:43:59.487Z
{ "id": 86, "name": "HTTP Request Smuggling" }
null
13
{ "asset_identifier": "stripo.email", "asset_type": "URL", "databaseId": 38701, "max_severity": "medium" }
End of preview.