The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Commit 0/1 could not be created on the Hub (after 6 attempts).
Error code: CreateCommitError
Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
id int64 | title string | created_at string | substate string | vulnerability_information string | reporter dict | team dict | has_bounty? bool | visibility string | disclosed_at string | weakness dict | original_report_id int64 | vote_count int64 | structured_scope dict |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
411,337 | Forget password link not expiring after email change. | 2018-09-19T05:13:33.396Z | resolved | I found a token miss configuration flaw in chaturbate.com, When we reset password for a user a link is sent to the registered email address but incase it remain unused and email is updated by user from setting panel then too that old token [reset link] sent at old email address remains valid.
#A better explanation
1-... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/S6z7ivTTH8w7QA8J3RbpWRiM/9a55e00ecd2cdf18a7f40678e6836e4cdc90bf95eb4b50c43f5fb775da40bb65"
},
"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "chaturbate",
"id": 30475,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The largest online adult cam site",
... | true | full | 2018-09-20T06:42:43.088Z | {
"id": 124,
"name": "Improper Authorization"
} | null | 35 | {
"asset_identifier": "chaturbate.com",
"asset_type": "URL",
"databaseId": 11722,
"max_severity": "critical"
} |
311,805 | Cross-origin resource sharing misconfig | 2018-02-02T21:19:34.071Z | duplicate | Description
An HTML5 cross-origin resource sharing (CORS) policy controls whether and how content running on other domains can perform two-way interaction with the domain that publishes the policy. The policy is fine-grained and can apply access controls per-request based on the URL and other features of the request.
T... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/117/520/2ca445c24a43aa38ee4d5937857f7dcbfc4da97b_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "semrush",
"id": 15966,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Online Visibility Management Platform.",
... | false | full | 2018-03-13T14:23:52.379Z | {
"id": 27,
"name": "Improper Authentication - Generic"
} | 193,559 | 3 | null |
385,322 | Open API For Username enumeration | 2018-07-23T07:32:50.020Z | not-applicable | We Can do username enumeration,
Reproduce:
1. Go any wordpress site.
#2.www.site.com/?author=1 (type ?author=1 at end of site)
3. You will get www.site.com/author/admin (now, admin is username of login panel of that site)
Thanks,
Sameer Phad
## Impact
- | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/vwlss7nfxhq42yveh4jh6876myka/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "wordpress",
"id": 55,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Beautiful sites of any kind.",
"name": ... | false | full | 2018-07-23T14:33:47.328Z | null | null | 24 | null |
139,398 | Read-Only user can execute arbitraty shell commands on AirOS | 2016-05-17T17:47:16.026Z | resolved | This vulnerability is very similar to #128750, but it avoid the solution applied to the last beta XM firmware.
In this report is used the last beta XM firmware: `XM.v6.0-beta9`
# Vulnerability
The vulnerability resides in the function `fetchCookies` file `remote.inc:117`. Just like last time is a non sanitization or ... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/033/613/8c3e2d95cf9be1554d0d1e8de292b45c73325047_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ui",
"id": 800,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Ubiquiti Inc.",
"twitter_hand... | true | full | 2016-08-05T09:36:57.491Z | {
"id": 58,
"name": "Command Injection - Generic"
} | null | 43 | null |
950,201 | HTML Injection at "city-mobil.ru" | 2020-08-03T13:31:55.282Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/CE24zD8tdJUYD6adpRS69L74/cccd3716a6d2e06174d2a41492445cb1d4bf85b4611a755bc810b9246a24d951"
},
... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mailru",
"id": 65,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Building the Internet since 1998",
"name"... | false | no-content | 2020-12-15T16:14:10.375Z | {
"id": 61,
"name": "Cross-site Scripting (XSS) - Reflected"
} | null | 11 | {
"asset_identifier": "Citymobil",
"asset_type": "OTHER",
"databaseId": 40415,
"max_severity": "critical"
} | |
488,371 | Insecure Storage and Overly Permissive Google Maps API Key in Android App | 2019-01-30T07:12:30.259Z | resolved | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/481/462/6495338f139b675efd88bbc4412fc76613b6df30_original.jpg/3c7b305354c9073c106ae3d1701798def... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mailru",
"id": 65,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Building the Internet since 1998",
"name"... | true | no-content | 2019-09-01T12:49:10.910Z | {
"id": 101,
"name": "Insecure Storage of Sensitive Information"
} | null | 10 | {
"asset_identifier": "ru.mail.cloud",
"asset_type": "GOOGLE_PLAY_APP_ID",
"databaseId": 240,
"max_severity": "critical"
} | |
272,588 | CSRF in Raffles Ticket Purchasing | 2017-09-28T04:08:10.330Z | resolved | Description:
========
An API endpoint get executed with no CSRF prevention, the endpoint did not verify session_id required in the post form. An attacker can crafted malicious form (Poc), which is executed by authenticated user action leading to huge balance lost.
Poc:
===
<!doctype html>
<html>
<head>
</head>
<bod... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/137/533/339f440fdc61b6dfeb663c8216d249618b8fd451_original.gif/9a55e00ecd2cdf18a7f40678e6836e4cd... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "unikrn",
"id": 2672,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "unikrn offers a world class comprehensive es... | true | full | 2018-04-10T02:10:08.175Z | {
"id": 45,
"name": "Cross-Site Request Forgery (CSRF)"
} | null | 19 | {
"asset_identifier": "unikrn.com",
"asset_type": "URL",
"databaseId": 453,
"max_severity": "critical"
} |
1,047,447 | HostAuthorization middleware does not suitably sanitize the Host / X-Forwarded-For header allowing redirection. | 2020-11-30T23:25:50.430Z | resolved | When a site is configured to use the `.tkte.ch` (leading dot) short form for domain name, ex:
```ruby
config.hosts << '.tkte.ch'
```
it is then sanitized in sanitize_string, where it is turned into a regex:
```ruby
def sanitize_string(host)
if host.start_with?(".")
/\A(.+\.)?#{Regexp.e... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/tktech",
"username": "tktech",
"verified": ... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "rails",
"id": 22,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Web development that doesn't hurt.",
"name"... | true | full | 2021-02-11T01:39:07.028Z | {
"id": 53,
"name": "Open Redirect"
} | null | 7 | {
"asset_identifier": "https://github.com/rails/rails",
"asset_type": "SOURCE_CODE",
"databaseId": 160,
"max_severity": "critical"
} |
1,406,495 | Ability to Disable the Login Attempt of any Shopify Owner for 24 hrs (Zero_Click) | 2021-11-21T14:12:27.876Z | resolved | Hello Team,
I Found a Bug in which Hacker Have Ability to Disable the Login Attempt of any Shopify Owner With (Zero_Click)
Summary:
----------
Proof of Concept;
-------------------
Credentials:
-------------
Victim = ███████.com (████████)
Hacker = █████████.com
Victim Sceanrio:
-----------------
Step 1 : Victi... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/hdt3mtd2ifw3l8eghlc8ks1z9u0j/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "shopify",
"id": 1382,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Shopify is a multi-channel commerce platfor... | true | full | 2022-02-15T06:20:35.527Z | {
"id": 102,
"name": "Client-Side Enforcement of Server-Side Security"
} | null | 57 | {
"asset_identifier": "accounts.shopify.com",
"asset_type": "URL",
"databaseId": 423,
"max_severity": "critical"
} |
1,927,480 | DiffieHellman doesn't generate keys after setting a key | 2023-03-31T13:33:05.838Z | resolved | DiffieHellman doesn't generate keys after setting a key
## Steps To Reproduce:
1. Instantiate: `const dh = crypto.createDiffieHellman(1024);`
2. Set private key:
```
//set private key to 2
dh.setPrivateKey(Buffer.from("02", 'hex'));
//outputs 02 (as expected)
console.log(dh.getPrivateKey().toString('hex'... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/7v1s2nnar9u3rbd28col4xwngzgi/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nodejs",
"id": 22984,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Node.js JavaScript Runtime",
"name"... | false | full | 2023-07-20T20:59:27.162Z | {
"id": 227,
"name": "Inconsistency Between Implementation and Documented Design"
} | null | 7 | {
"asset_identifier": "https://github.com/nodejs/node",
"asset_type": "SOURCE_CODE",
"databaseId": 666,
"max_severity": "critical"
} |
94,230 | Cross-site Scripting in all Zopim | 2015-10-16T14:56:26.648Z | resolved | Hello.
This vulnerability works on all sites where there Zopim chat.
Vulnerable link:
https://www.zopim.com/#1=1&__zopim_widget_proxy=1.zopim.com/s/W/xdds/PIJ4+155G8p7LL3w/c/1444997086678%22%3E%3C/script%3E%3Csvg/onload=alert%28%22XSS%22%29%3E
Vulnerable param is __zopim_widget_proxy.
For XSS i used "></script><svg/onl... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/038/696/21beef0c831766fad769a95c8f2a66692c65dfc9_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "zendesk",
"id": 205,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Zendesk is a leading cloud-based customer se... | true | full | 2015-10-20T22:53:27.181Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 2 | null |
1,137,218 | Access control issue on invoice documents downloading feature. | 2021-03-26T13:17:25.719Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/icsb2flpwf8cufoi8q8sgdpeaxw4/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "moneybird",
"id": 1361,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Cloud accounting",
"name": "Moneybird... | true | no-content | 2021-04-01T14:16:18.532Z | {
"id": 26,
"name": "Improper Access Control - Generic"
} | null | 26 | {
"asset_identifier": "moneybird.com",
"asset_type": "URL",
"databaseId": 16186,
"max_severity": "critical"
} | |
1,474,536 | connect.8x8.com: admin user can send invites on behalf of another admin user via POST /api/v1/users/<User ID>/invites | 2022-02-08T16:13:35.632Z | resolved | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/ni07o23q7345senc7og6vhuqpkab/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "8x8-bounty",
"id": 49732,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "8x8 Bounty",
"twitt... | true | no-content | 2023-02-15T07:48:12.281Z | {
"id": 26,
"name": "Improper Access Control - Generic"
} | null | 94 | {
"asset_identifier": "connect.8x8.com",
"asset_type": "URL",
"databaseId": 61539,
"max_severity": "critical"
} | |
53,088 | SSRF vulnerability (access to metadata server on EC2 and OpenStack) | 2015-03-23T15:08:49.061Z | resolved | In bug [#50537](https://hackerone.com/reports/50537), **haquaman** reported a SSRF vulnerability in the meme creation section of Phabricator. Ticket [T6755](https://secure.phabricator.com/T6755) was created and the HackerOne issue was closed as "Won't fix".
[T6755](https://secure.phabricator.com/T6755) states that *... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/223/9346bb3a772b6433536cfbbe2a0a6c4c7a786fe9_original.jpg/3c7b305354c9073c106ae3d1701798def... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "phabricator",
"id": 18,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Phabricator is a collection of open sourc... | true | full | 2015-03-26T18:37:57.571Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 4 | null |
237,071 | X-Frame-Options | 2017-06-06T01:35:07.815Z | informative | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/154/935/5f618f48ba808be6d0258844f8d8922dad9c86eb_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "coinbase",
"id": 104,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Creating an open financial system for the w... | false | no-content | 2017-06-22T17:07:14.836Z | {
"id": 74,
"name": "UI Redressing (Clickjacking)"
} | null | 1 | null | |
14,494 | Clickjacking & CSRF attack can be done at https://app.mavenlink.com/login | 2014-06-02T22:25:15.066Z | resolved | Hello,
My name is Vineet bhardwaj. i am security researcher and i pen test your website( https://app.mavenlink.com/login) and i found there is click jacking attack and CSRF attack can be done.
POC:
<html><head>
<title> CSRF testing </title>
<style>
frame {
opacity: 0.5;
border: none;
position: absolute... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/006/510/7f9f38ce92d31dade42f9ff5a8bb1ba4c02204a6_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mavenlink",
"id": 48,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Mavenlink provides sophisticated software a... | false | full | 2014-09-19T15:35:11.812Z | {
"id": 45,
"name": "Cross-Site Request Forgery (CSRF)"
} | null | 2 | null |
50,776 | A user can edit comments even after video comments are disabled | 2015-03-10T09:12:26.084Z | resolved | A user can escalate privileges and edit his previous comments, when comments are disabled for a video.
Steps to verify:
1. Log into vimeo.com as Alice. Upload a video (say, video id - 118026546) and allow anyone to leave comments for that video .
2. Login as Bob and navigate to the video URL - https://vimeo.com/11... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/001/170/fc657d5dfd17ac30235e5687c8b2d9b461e0f64e_original.jpg/3c7b305354c9073c106ae3d1701798def... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "vimeo",
"id": 56,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Make life worth watching",
"name": "Vimeo",... | true | full | 2015-03-11T14:37:33.636Z | {
"id": 75,
"name": "Privilege Escalation"
} | null | 2 | null |
901,210 | Redmin API Key Exposed In GIthub | 2020-06-18T03:11:38.534Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/f5nhz1d1xaxs3tetz8pan9scp2dz/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mailru",
"id": 65,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Building the Internet since 1998",
"name"... | true | no-content | 2020-11-25T15:58:05.827Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 20 | {
"asset_identifier": "Foodplex",
"asset_type": "OTHER",
"databaseId": 49351,
"max_severity": "critical"
} | |
395,944 | Reflected XSS in the npm module express-cart. | 2018-08-16T11:34:50.254Z | resolved | > NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report!
I would like to report Reflected XSS in the npm module... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/avi3719",
"username": "avi3719",
"verified"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nodejs-ecosystem",
"id": 23949,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "This program was used to handle v... | false | full | 2019-02-15T06:25:38.924Z | {
"id": 61,
"name": "Cross-site Scripting (XSS) - Reflected"
} | null | 15 | {
"asset_identifier": "express-cart",
"asset_type": "SOURCE_CODE",
"databaseId": 10291,
"max_severity": "critical"
} |
1,067,004 | Sensitive data exposure via https://███████/secure/QueryComponent!Default.jspa - CVE-2020-14179 | 2020-12-27T13:46:56.469Z | resolved | ##Summary:
Information Disclosure vulnerability in outdated Jira.
##Description:
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa en... | {
"cleared": false,
"disabled": true,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/ba56adcb299ff13a87475bf",
"username": "ba56adc... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "deptofdefense",
"id": 16064,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. Dept Of Defens... | false | full | 2021-01-12T21:43:53.661Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 3 | null |
1,569,926 | Credential leak when use two url | 2022-05-13T19:09:38.556Z | not-applicable | ## Summary:
Curl can leak user credentials if use two url.
## Steps To Reproduce:
1. curl -I -v -u aaa:bbb hackerone.com curl.se
2. the output is:
> Connected to hackerone.com (104.16.100.52) port 80 (#0)
> Server auth using Basic with user 'aaa' ... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/liang1",
"username": "liang1",
"verified": ... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "curl",
"id": 35663,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "cURL is an Open Source project providing a li... | false | full | 2022-06-27T06:55:01.273Z | {
"id": 87,
"name": "Insufficiently Protected Credentials"
} | null | 2 | {
"asset_identifier": "https://github.com/curl/curl",
"asset_type": "SOURCE_CODE",
"databaseId": 18844,
"max_severity": "critical"
} |
67,929 | Redirection Page throwing error instead of redirecting to site | 2015-06-14T18:45:01.721Z | resolved | Hello
I was just testing and found that http://anysite.com.com/index.php?ref="><svg/onload=window.onerror=alert;throw/XSS/;// does not shows the usual External link warning page, but shows some error page .
Thanks | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/003/771/41805267a81081c293979a5dbc0599bcc4af3ac2_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "security",
"id": 13,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Vulnerability disclosure should be safe, tra... | false | full | 2016-05-25T02:13:58.505Z | {
"id": 57,
"name": "Violation of Secure Design Principles"
} | null | 3 | null |
681,468 | The password recovery let users know whether an email address exists or not in the website | 2019-08-25T00:03:13.241Z | resolved | URL: https://apps.nextcloud.com/password/reset/
I have tried to recover the password for some emails:
test@test.com (exists)
teste@teste.com.br (does not exists)
After I clicked the "reset my password"'s button, the website informed that the email did not exist.
## Impact
This is a bad practice, and it is an invit... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/m4eqwpxb19wtullkuv0b4hno7cd6/3c7b305354c9073c106ae3d1701798defaaf5be84... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nextcloud",
"id": 13291,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Access, share and protect your files, ca... | false | full | 2019-11-22T17:51:03.959Z | {
"id": 31,
"name": "Improper Restriction of Authentication Attempts"
} | null | 10 | {
"asset_identifier": "apps.nextcloud.com",
"asset_type": "URL",
"databaseId": 42,
"max_severity": "critical"
} |
2,012,135 | [CVE-2023-22799] Possible ReDoS based DoS vulnerability in GlobalID | 2023-06-04T08:02:09.284Z | resolved | I made a report and patch at https://hackerone.com/reports/1696752.
https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127
> There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expr... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/012/811/4b35334fa2fcf93b2e510174e09470fb42bbf03a_original.gif/9a55e00ecd2cdf18a7f40678e6836e4c... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "ibb",
"id": 54349,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The Internet Bug Bounty rewards security resea... | true | full | 2023-07-27T06:45:30.531Z | {
"id": 48,
"name": "Uncontrolled Resource Consumption"
} | null | 4 | {
"asset_identifier": "https://github.com/rails",
"asset_type": "SOURCE_CODE",
"databaseId": 80881,
"max_severity": "critical"
} |
872,190 | Plaintext storage of a password on kubernetes release bucket | 2020-05-12T19:19:27.083Z | informative | Report Submission Form
## Summary:
During my recon I found these two buckets dl.k8s.io and dl.kubernetes.io which actually redirects to https://storage.googleapis.com/kubernetes-release/.
By searching the string "password" under https://storage.googleapis.com/kubernetes-release/ I found a file called rsyncd.password (... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/NyGLUvi87hCNJqmipxC5NVtJ/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
},
"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "kubernetes",
"id": 39386,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Kubernetes",
"twitt... | false | full | 2021-01-07T18:30:33.292Z | {
"id": 21,
"name": "Plaintext Storage of a Password"
} | null | 0 | {
"asset_identifier": "k8s.io",
"asset_type": "URL",
"databaseId": 34429,
"max_severity": "critical"
} |
304,708 | Information exposure via error pages (www.lahitapiola.fi Tomcat) | 2018-01-14T11:59:38.299Z | resolved | **Summary:**
Information exposure via error pages
**Description:**
Hello there!
I take the risk that this report might be closed as a N/A but because you are running outdated tomcat I wanted to take this risk and report this to you.
So here we go..
When you navigate to the page e.g.
https://www.lahitapiola.fi/cs/S... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://hackerone-us-west-2-production-attachments.s3.us-west-2.amazonaws.com/variants/qnaqvuyajxqzh6ms6m1hih7hedxw/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd7... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "localtapiola",
"id": 8416,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "LocalTapiola’s products and services c... | true | full | 2018-03-02T04:59:45.904Z | {
"id": 82,
"name": "Information Exposure Through an Error Message"
} | null | 6 | {
"asset_identifier": "www.lahitapiola.fi",
"asset_type": "URL",
"databaseId": 1045,
"max_severity": "critical"
} |
1,984,060 | After the upload of an private file, using transformations, the file becomes public without the possibility of changing it. | 2023-05-11T14:54:33.064Z | resolved | ## Summary:
When an user uploads a private file, ex (Screenshot 1), where only he has access to. Using the "View transformations" function can generate different kinds of image transformations (Screenshot 2). But after the generation of that transformation for example clicking on the regenerate button next to profile.... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/limusec",
"username": "limusec",
"verified"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mozilla",
"id": 61236,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Mozilla web bug bounty program specific to... | true | full | 2023-10-20T09:37:30.009Z | {
"id": 26,
"name": "Improper Access Control - Generic"
} | null | 54 | {
"asset_identifier": "phabricator.allizom.org",
"asset_type": "URL",
"databaseId": 635518,
"max_severity": "critical"
} |
1,068,934 | [h1ctf-Grinch Networks] MrR3b00t Saving the Christmas | 2020-12-30T19:02:05.093Z | resolved | > Disclaimer: Certain things are a bit modified to set the pieces for the story. Also you can find the flags for all 12 challenges in file F1138300 , Now enjoy :)
```
█▀▄▀█ █▀█ ░ █▀█ █▄▄ █▀█ █▀█ ▀█▀
█░▀░█ █▀▄ ▄ █▀▄ █▄█ █▄█ █▄█ ░█░ saves the Christmas
```
**_Episode - 0x00_ Pil0t.py**
It was a gloomy clear night, Mr.... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/WVQ792pdimTiEpL8JcJVzyrn/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
},
"... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "h1-ctf",
"id": 46757,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Let's save the holidays together! #Togethe... | false | full | 2021-01-11T22:36:53.487Z | null | null | 2 | {
"asset_identifier": "*.hackyholidays.h1ctf.com",
"asset_type": "WILDCARD",
"databaseId": 59882,
"max_severity": "critical"
} |
296,622 | Blind XXE on pu.vk.com | 2017-12-10T01:18:27.212Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/136/191/5e385ddcb9022257bb238b1bba3a1683a75e57e3_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "vkcom",
"id": 1254,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "VKontakte is the largest European social net... | true | no-content | 2018-03-04T13:15:15.979Z | {
"id": 54,
"name": "XML External Entities (XXE)"
} | null | 16 | null | |
574,638 | Lack of proper paymentProfileUUID validation allows any number of free rides without any outstanding balance | 2019-05-08T23:55:03.051Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/eequalsmc2",
"username": "eequalsmc2",
"ver... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "uber",
"id": 314,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Uber",
"twitter_handle": ""... | true | no-content | 2019-07-18T01:44:08.187Z | {
"id": 65,
"name": "Business Logic Errors"
} | null | 75 | null | |
181,803 | SQL Injection /webApp/oma_conf ctx parameter (viestinta.lahitapiola.fi) | 2016-11-12T17:58:34.924Z | resolved | **Vulnerable script**: /webApp/oma_conf
**Vulnerable parameter**: ctx[vars][email]
**Database**: PostgreSQL
**PoC**
```http
POST /webApp/oma_conf HTTP/1.1
Host: viestinta.lahitapiola.fi
Content-Type: application/x-www-form-urlencoded
Content-Length: 1131
ctx=%3Cctx+lang%3D%22en%22+date%3D%222016-11-12T17%3A33%3A06Z%2... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/205/e865d3ffcef54eba49cba80bd59502a347519715_original.jpeg/ede8cd84a64d5392a2bb88ecb598721... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "localtapiola",
"id": 8416,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "LocalTapiola’s products and services c... | true | full | 2016-12-08T13:19:18.694Z | {
"id": 67,
"name": "SQL Injection"
} | null | 50 | null |
470,398 | Local privilege escalation bug using Keybase redirector on macOS | 2018-12-20T21:33:40.369Z | resolved | There's a local privilege escalation bug in the latest version of Keybase for
macOS.
The issue is in the process of launching `keybase-redirector`. The process works as follows:
1. Copy `keybase-redirector` binary to a root-only location
2. Check its signature
3. Launch the binary
[Code ref](https://github.com/keyba... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/votava",
"username": "votava",
"verified": ... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "keybase",
"id": 2809,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Keybase",
"twitter_hand... | true | full | 2019-01-30T18:15:40.373Z | {
"id": 75,
"name": "Privilege Escalation"
} | null | 23 | null |
245,296 | Persistent XSS on keybase.io via "payload" field in `/user/sigchain_signature.toffee` template | 2017-07-02T09:42:52.752Z | resolved | ## Issue
Keybase allows you to see other users' sigchains by navigating to <https://keybase.io/<username\>/sigchain>. The "Payload" field containing JSON related to the chainlink on the right side of the page is not correctly escaped during templating, leading to a persistent XSS as users have a high degree of control... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/447/d7846c3a70ff69fbfa83f43531b3ca68c55545df_original.JPG/cccd3716a6d2e06174d2a41492445cb1... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "keybase",
"id": 2809,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Keybase",
"twitter_hand... | true | full | 2019-03-14T15:15:33.139Z | {
"id": 62,
"name": "Cross-site Scripting (XSS) - Stored"
} | null | 265 | null |
418,145 | No rate limiting in changing room subject. | 2018-10-03T12:23:54.508Z | resolved | Before i shed more light on this: I noticed i can create over 200 apps but i don't really know how valid that was.
I want to report that there is no rate limiting in changing room subject.
Attacker scenrio:
1. Navigate to https://chaturbate.com/b/your username
2. Try to create a room subject and capture the request.
3... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/cunn",
"username": "cunn",
"verified": fals... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "chaturbate",
"id": 30475,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "The largest online adult cam site",
... | true | full | 2018-10-09T03:59:44.566Z | null | null | 18 | {
"asset_identifier": "chaturbate.com",
"asset_type": "URL",
"databaseId": 11722,
"max_severity": "critical"
} |
238,915 | Text injection on status.algolia.com | 2017-06-11T06:55:15.028Z | resolved | Hi Algolia team!
I just found a text injection vulnerabilty in [status.algolia.com/clusters](https://status.algolia.com/clusters/) . Please follow the steps below.
**Vulnerable URL**
[status.algolia.com](https://status.algolia.com/clusters/)
Steps to reproduce:
* Go to [Vulnerable URL](https://status.algolia.com/c... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/111/452/3910a59fc37678124c0b2592126ea98758c2eb43_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "algolia",
"id": 443,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Hosted search API that delivers instant and ... | false | full | 2017-08-25T10:17:57.962Z | {
"id": 57,
"name": "Violation of Secure Design Principles"
} | null | 3 | null |
7,898 | Persistent Cross-site scripting vulnerability settings. | 2014-04-17T19:29:03.968Z | resolved | Hello,
I created an account with as group name `"><img src=x onerror=alert(4)>`, after that I went to settings and found a Cross-site scripting vulnerability located at that page.
The url for me : https://app.respond.ly/6sjp/settings/account
I have a proof of concept in the attachment.
best regards
Olivi... | {
"cleared": true,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/000/045/1828acf6bd0443abccd1796fb54be386d874708c_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca1... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "respondly",
"id": 128,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Team Inbox for Email & Twitter",
"nam... | false | full | 2014-04-21T16:31:16.010Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 1 | null |
1,106,009 | critical information disclosure | 2021-02-17T22:01:23.421Z | resolved | ##Description:
hey all ,
I have found critical information through this endpoint /██████;
this endpoint contains all env vars used in a www.██████ such as server credentials, db ,mail , twitter client_id and client_secret , facebook client_id and client_secret, etc...
## Impact
full access control on every servi... | {
"cleared": false,
"disabled": true,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/ba56adcb299ff13a87475bf",
"username": "ba56adc... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "deptofdefense",
"id": 16064,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "U.S. Dept Of Defens... | false | full | 2021-03-11T21:27:08.208Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 19 | null |
157,813 | XSS on Meta Tag at https://m.olx.ph | 2016-08-09T10:04:09.787Z | resolved | Hi,
There is improper validation at q parameter on https://m.olx.ph/ where it can be manipulated by an attacker to include his/her XSS payload to execute javascript code.
As example:
``https://m.olx.ph/all-results?q=0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgndGVzdDMnKTwvc2NyaXB0Pg" HTTP-EQUIV="refresh" a="a``
... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/002/150/f3874ccfe5a432c25e4443e62e72beed49ca425e_original.jpeg/ede8cd84a64d5392a2bb88ecb598721... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "olx",
"id": 8146,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "OLX is an online classifieds platform that ena... | false | full | 2017-01-20T09:25:27.796Z | {
"id": 60,
"name": "Cross-site Scripting (XSS) - Generic"
} | null | 7 | null |
165,309 | Subdomain Takeover in http://genghis-cdn.shopify.io/ pointing to Fastly | 2016-09-02T15:25:15.655Z | resolved | Hi,
I've found a Shopifu cdn domain here which had an instance of fastly setup but did not remove the dns record when the service was cancelled. a subdomain takeover similar to that of https://hackerone.com/reports/32825 could be possible.
Vulnerable URL: http://genghis-cdn.shopify.io
Page Response:
```
Fastly erro... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/017/146/bc97fcb48703e602e82e5ab47ccf42d1e3f0480a_original.jpg/3c7b305354c9073c106ae3d1701798de... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "shopify",
"id": 1382,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Shopify is a multi-channel commerce platfor... | false | full | 2016-09-06T15:46:49.314Z | null | null | 22 | null |
204,568 | stack trace exposed on https://receipts.uber.com/ | 2017-02-08T12:39:39.710Z | informative | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "/assets/avatars/default-25f7248a18bdf9e2dc8310319b148d66cff430fa0fade6c5f25fee1b8d7f27ed.png"
},
"url": "/mariogomez1",
"username": "mariogomez1",
"v... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "uber",
"id": 314,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "Uber",
"twitter_handle": ""... | false | no-content | 2021-02-25T22:33:22.941Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 7 | null | |
319,476 | `whereis` concatenates unsanitized input into exec() command | 2018-02-25T06:53:14.046Z | resolved | I would like to report command injection in `whereis`
It allows to inject arbitrary shell commands by trying to locate crafted filenames.
# Module
**module name:** whereis
**version:** 0.4.0
**npm page:** `https://www.npmjs.com/package/whereis`
## Module Description
> Simply get the first path to a bin on any syste... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/000/068/907/abd483931dad2c93e376707dd59719cc277309cd_original.png/d3dc6b2d7e2dc3657e8861b0d7e2dfca... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nodejs-ecosystem",
"id": 23949,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "This program was used to handle v... | false | full | 2018-03-28T06:17:58.607Z | {
"id": 58,
"name": "Command Injection - Generic"
} | null | 9 | {
"asset_identifier": "whereis",
"asset_type": "SOURCE_CODE",
"databaseId": 7254,
"max_severity": "critical"
} |
145,495 | nextcloud.com: Directory listening for 'wp-includes' forders | 2016-06-17T18:02:13.368Z | resolved | Hello guys,
**_Details:_**
The web server is configured to display the list of files contained in this directory. As a result of a misconfiguration - end user / attacker able to see content of the folders with systemically important files
**_Vulnerable place:_**
/wp-includes directory
when I tried to navigate to thi... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/003co5s7ttfbvqi1zah9g22ny3wm/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "nextcloud",
"id": 13291,
"offers_bounties": true,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Access, share and protect your files, ca... | false | full | 2016-06-17T18:10:38.465Z | {
"id": 18,
"name": "Information Disclosure"
} | null | 4 | null |
1,070,532 | RCE Apache Struts2 remote command execution (S2-045) on [wifi-partner.mtn.com.gh] | 2021-01-03T11:18:36.101Z | resolved | ## Summary:
A Remote Code Execution vulnerability exists in Apache Struts2 when performing file upload based on Jakarta Multipart parser. It is possible to perform a RCE attack with a malicious Content-Type value. If the Content-Type value isn't valid an exception is thrown which is then used to display an error messag... | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/gce5nrtrsgkov7le19btk4ra2mhq/d3dc6b2d7e2dc3657e8861b0d7e2dfca1a6d513dd784c613f4e56738907cea98"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "mtn_group",
"id": 41919,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "",
"name": "MTN Group",
"twitte... | false | full | 2021-09-09T11:34:14.647Z | {
"id": 70,
"name": "Code Injection"
} | null | 26 | {
"asset_identifier": "mtn.com.gh",
"asset_type": "URL",
"databaseId": 34315,
"max_severity": "critical"
} |
1,631,228 | [demo.stripo.email] HTTP request Smuggling | 2022-07-08T10:38:10.702Z | resolved | {
"cleared": false,
"disabled": false,
"hacker_mediation": false,
"hackerone_triager": false,
"is_me?": false,
"profile_picture_urls": {
"small": "https://profile-photos.hackerone-user-content.com/variants/rshtzgfzd3aqze11wxoban88t79d/3c7b305354c9073c106ae3d1701798defaaf5be844fb8fdfa49ca62f991a2c2c"
}... | {
"awards_miles": false,
"default_currency": "usd",
"handle": "stripo",
"id": 42368,
"offers_bounties": false,
"only_cleared_hackers": false,
"pentest_feature_enabled?": false,
"pentest_retesting_ends_at": null,
"permissions": [],
"profile": {
"about": "Stripo is a lightweight and intuitive emai... | false | no-content | 2024-02-15T10:43:59.487Z | {
"id": 86,
"name": "HTTP Request Smuggling"
} | null | 13 | {
"asset_identifier": "stripo.email",
"asset_type": "URL",
"databaseId": 38701,
"max_severity": "medium"
} |
End of preview.