Name: Atlassian
Link: https://bugcrowd.com/atlassian
Severity: P3
Hacker: UpdateLap
Points: 0
Target: Confluence Server
Reported: 2022-09-06 20:01:14.77 +0000 UTC
Accepted: 2023-09-28 00:00:00 +0000 UTC
Submission accepted on target: Confluence Server
Name: Tesla
Link: https://bugcrowd.com/tesla
Severity: P3
Hacker: Tak
Points: 10
Target: *.tesla.com
Reported: 2023-09-18 20:08:55.644 +0000 UTC
Accepted: 2023-09-28 00:00:00 +0000 UTC
*Submission accepted on target: .tesla.com
Name: Rakuten VDP
Link: https://bugcrowd.com/rakuten-vdp
Severity: P3
Hacker: Wast3r
Points: 0
Target: *.rakuten.com
Reported: 2023-09-12 03:42:55.666 +0000 UTC
Accepted: 2023-09-28 00:00:00 +0000 UTC
*Submission accepted on target: .rakuten.com
Name: Rakuten VDP
Link: https://bugcrowd.com/rakuten-vdp
Severity: P3
Hacker: khanjanny
Points: 0
Target: *.rakuten.com
Reported: 2023-08-04 03:46:49.013 +0000 UTC
Accepted: 2023-09-28 00:00:00 +0000 UTC
*Submission accepted on target: .rakuten.com
Name: Xfinity Home & xFi
Link: https://bugcrowd.com/xfinity-home
Severity: P4
Hacker:
Points: 0
Target: *.ssr.ccp.xcal.tv
Reported: 2023-09-21 19:26:35.235 +0000 UTC
Accepted: 2023-09-28 00:00:00 +0000 UTC
**Submission accepted on target: *.ssr.ccp.xcal.tv **
Name: OpenSea Managed Bug Bounty Program
Link: https://bugcrowd.com/opensea
Severity: P4
Hacker:
Points: 0
Target: opensea.io
Reported: 2023-09-21 19:48:06.933 +0000 UTC
Accepted: 2023-09-28 00:00:00 +0000 UTC
Submission accepted on target: opensea.io
Name: Facebook
Link: https://bugcrowd.com/facebook
Severity: P1
Hacker: brocked200
Points: 0
Target:
Reported: 2023-09-27 23:40:51.497 +0000 UTC
Accepted: 0001-01-01 00:00:00 +0000 UTC
Submission Claimed
Name: Facebook
Link: https://bugcrowd.com/facebook
Severity: P1
Hacker: brocked200
Points: 0
Target:
Reported: 2023-09-27 23:40:22.483 +0000 UTC
Accepted: 0001-01-01 00:00:00 +0000 UTC
Submission Claimed
Name: Pinterest
Link: https://bugcrowd.com/pinterest
Severity: P2
Hacker:
Points: 0
Target: *.pinterest.com Web Apps
Reported: 2023-09-17 22:18:09.257 +0000 UTC
Accepted: 2023-09-28 00:00:00 +0000 UTC
*Submission accepted on target: .pinterest.com Web Apps
Name: United Airlines
Link: https://bugcrowd.com/united-vdp
Severity: P1
Hacker:
Points: 0
Target: *.ual.com
Reported: 2023-09-27 00:42:08.1 +0000 UTC
Accepted: 2023-09-27 00:00:00 +0000 UTC
*Submission accepted on target: .ual.com
Name: Okta
Link: https://bugcrowd.com/okta
Severity: P4
Hacker: lhashashinl_
Points: 5
Target: http://app.scaleft.com/
Reported: 2023-08-31 08:38:07.241 +0000 UTC
Accepted: 2023-09-27 00:00:00 +0000 UTC
Submission accepted on target: http://app.scaleft.com/
Name: Okta
Link: https://bugcrowd.com/okta
Severity: P4
Hacker:
Points: 0
Target: bugcrowd-%username%-1.oktapreview.com
Reported: 2023-09-22 01:44:33.882 +0000 UTC
Accepted: 2023-09-27 00:00:00 +0000 UTC
Submission accepted on target: bugcrowd-%username%-1.oktapreview.com
Name: Atlassian
Link: https://bugcrowd.com/atlassian
Severity: P3
Hacker: norwin_boniao
Points: 10
Target: Jira Service Management Cloud (bugbounty-test-<bugcrowd-name>.atlassian.net)
Reported: 2020-06-11 18:15:42.042 +0000 UTC
Accepted: 2020-06-24 00:00:00 +0000 UTC
Submission accepted on target: Jira Service Management Cloud (bugbounty-test-.atlassian.net)
Name: Facebook
Link: https://bugcrowd.com/facebook
Severity: P4
Hacker: mohamed_ajimi02
Points: 0
Target:
Reported: 2023-09-27 19:39:27.726 +0000 UTC
Accepted: 0001-01-01 00:00:00 +0000 UTC
Submission Claimed
Name: Facebook
Link: https://bugcrowd.com/facebook
Severity: P4
Hacker: mohamed_ajimi02
Points: 0
Target:
Reported: 2023-09-27 19:39:27.05 +0000 UTC
Accepted: 0001-01-01 00:00:00 +0000 UTC
Submission Claimed
Name: Atlassian
Link: https://bugcrowd.com/atlassian
Severity: P2
Hacker: Mr-Phoenix05
Points: 0
Target: Any associated *.atlassian.com or *.atl-paas.net domain that can be exploited DIRECTLY from the *.atlassian.net instance
Reported: 2020-07-30 01:31:26.213 +0000 UTC
Accepted: 2020-07-30 00:00:00 +0000 UTC
**Submission accepted on target: Any associated *.atlassian.com or .atl-paas.net domain that can be exploited DIRECTLY from the .atlassian.net instance
Name: Keeper Security Public Bounty Program
Link: https://bugcrowd.com/keepersecurity
Severity: P2
Hacker: hckiang
Points: 20
Target: Keeper Browser Extension
Reported: 2023-09-21 10:10:59.435 +0000 UTC
Accepted: 2023-09-27 00:00:00 +0000 UTC
Submission accepted on target: Keeper Browser Extension
Name: Atlassian
Link: https://bugcrowd.com/atlassian
Severity: P4
Hacker: Yougate
Points: 5
Target: Confluence Cloud Premium (bugbounty-test-<bugcrowd-name>.atlassian.net/wiki)
Reported: 2023-09-24 11:09:56.853 +0000 UTC
Accepted: 2023-09-27 00:00:00 +0000 UTC
Submission accepted on target: Confluence Cloud Premium (bugbounty-test-.atlassian.net/wiki)
Name: Twilio
Link: https://bugcrowd.com/twilio
Severity: P3
Hacker:
Points: 0
Target: Any host/web property verified to be owned by Twilio
Reported: 2023-09-23 05:58:12.763 +0000 UTC
Accepted: 2023-09-27 00:00:00 +0000 UTC
Submission accepted on target: Any host/web property verified to be owned by Twilio
Name: OpenSea Managed Bug Bounty Program
Link: https://bugcrowd.com/opensea
Severity: P2
Hacker: b4by_y0d4
Points: 20
Target: opensea.io
Reported: 2023-09-23 02:44:04.557 +0000 UTC
Accepted: 2023-09-27 00:00:00 +0000 UTC
Submission accepted on target: opensea.io