bug bounty

HackerOne Bug Bounty Disclosure: curl-socketpair-fallback-vulnerable-to-man-in-the-middle-attack-jmanojlovich

Company Name: curl Company HackerOne URL: https://hackerone.com/curl Submitted By:jmanojlovichLink to Submitters Profile:https://hackerone.com/jmanojlovich Report Title:`Curl_socketpair()` fallback vulnerable to man-in-the-middle attackReport Link:https://hackerone.com/reports/3148937Date...

BugCrowd Bug Bounty Disclosure: P5 – Host Header Injection on Password-Reset Functionality Causes Unauthorized Redirect to Attacker-Controlled Domain Where a Users Could be Tricked into Entering Account Credentials for Account Takeover or PII Leak – Imshadab18

HackerOne Bug Bounty Disclosure: -xenoblade-chronicles-x-definitive-edition-improper-validation-of-names-allows-injecting-formatting-tags-and-bypassing-profanity-filter-roccodev

Company Name: Nintendo Company HackerOne URL: https://hackerone.com/nintendo Submitted By:roccodevLink to Submitters Profile:https://hackerone.com/roccodev Report Title: Improper validation of names allows injecting...

HackerOne Bug Bounty Disclosure: -xenoblade-chronicles-x-definitive-edition-unrestricted-rpcs-allow-dos-and-writing-arbitrary-flags-remotely-roccodev

Company Name: Nintendo Company HackerOne URL: https://hackerone.com/nintendo Submitted By:roccodevLink to Submitters Profile:https://hackerone.com/roccodev Report Title: Unrestricted RPCs allow DoS and writing...

HackerOne Bug Bounty Disclosure: corrupted-pointer-in-node-fs-readfileutf-const-functioncallbackinfo-value-args-when-args-is-a-string-justinnietzel

Company Name: Node.js Company HackerOne URL: https://hackerone.com/nodejs Submitted By:justinnietzelLink to Submitters Profile:https://hackerone.com/justinnietzel Report Title:Corrupted pointer in node::fs::ReadFileUtf8(const FunctionCallbackInfo& args) when...

HackerOne Bug Bounty Disclosure: weak-rate-limiting-controls-in-the-login-page-expose-system-to-brute-force-and-dos-attacks-hajjaj

Company Name: Lichess Company HackerOne URL: https://hackerone.com/lichess Submitted By:hajjaj-Link to Submitters Profile:https://hackerone.com/hajjaj- Report Title:Weak Rate Limiting Controls in the (LOGIN)...

HackerOne Bug Bounty Disclosure: open-redirect-vulnerability-in-oauth-flow-leading-to-potential-phishing-attack-delsec

Company Name: Lichess Company HackerOne URL: https://hackerone.com/lichess Submitted By:delsec_Link to Submitters Profile:https://hackerone.com/delsec_ Report Title:Open Redirect Vulnerability in OAuth Flow Leading...

BugCrowd Bug Bounty Disclosure: P5 – EXIF Geolocation Data Not Stripped in NASA CDSCC Image – Exposure of Sensitive Location (Canberra Deep Space Communication Complex) – Faxcel

EXIF Geolocation Data Not Stripped in NASA CDSCC Image - Exposure of Sensitive Location (Canberra Deep Space Communication Complex) EXIF...

BugCrowd Bug Bounty Disclosure: P5 – Improper Access Control: Authenticated Resource Exposed via Wayback Machine Archive- Nasa sheets& docs – RootVaibhav

Improper Access Control: Authenticated Resource Exposed via Wayback Machine Archive- Nasa sheets& docs Improper Access Control: Authenticated Resource Exposed via...

BugCrowd Bug Bounty Disclosure: P3 – Exposed Python Script with Hardcoded SFTP Credentials, Internal IPs, and Sensitive Data Access – unknown_soldier

Exposed Python Script with Hardcoded SFTP Credentials, Internal IPs, and Sensitive Data Access Exposed Python Script with Hardcoded SFTP Credentials,...

BugCrowd Bug Bounty Disclosure: P5 – Public Exposure of Internal Calibration Planning File on heasarc.gsfc.nasa.gov (XMM-Newton) – JustAKids

Public Exposure of Internal Calibration Planning File on heasarc.gsfc.nasa.gov (XMM-Newton) Public Exposure of Internal Calibration Planning File on heasarc.gsfc.nasa.gov (XMM-Newton)...

BugCrowd Bug Bounty Disclosure: P5 – Public Exposure of Internal Calibration Planning File on heasarc.gsfc.nasa.gov (XMM-Newton) – JustAKids

Public Exposure of Internal Calibration Planning File on heasarc.gsfc.nasa.gov (XMM-Newton) Public Exposure of Internal Calibration Planning File on heasarc.gsfc.nasa.gov (XMM-Newton)...