Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
533,494 coordinated disclosures
333,515 fixed vulnerabilities
784 bug bounties with 1,552 websites
15,924 researchers, 1099 honor badges

AnimeCons.com Bug Bounty Program

AnimeCons.com runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of AnimeCons.com

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between AnimeCons.com and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

*.fancons.com
*.animecons.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

AnimeCons.com and FanCons.com are literally the same scripts on the same server. AnimeCons.com just filters out any conventions without anime programming...so there's no point to test both AnimeCons.com AND FanCons.com because if there's an issue on one site, it will be an issue on both...and when it's fixed on one, it will be fixed on both.

...so don't even bother testing AnimeCons.com.

Also, don't bother testing our forums either. We didn't write that software and will be turning that forum server off soon anyway. Any forum bug bounties that are logged will just be ignored. Don't waste your time or ours.

Testing Requirements:

Please don't keep slamming out submission forms over and over in attempts to find vulnerabilities. We've had some testers come to our site (perhaps with good intentions, but maybe looking for vulnerabilities they can exploit themselves) who have submitted garbage data to us literally THOUSANDS of times. All submitted data gets reviewed by a human being and doesn't get auto-posted...which means we have to go in and reject all those entries. If you do submit over 100 garbage form entries, don't be shocked if your IP gets blocked.

...so please, don't keep slamming our submission forms.

Please don't use automated scanners like NexPloit.

Possible Awards:

Sorry, our sites don't bring in a lot of traffic and ad revenue barely pays the server bill so we're unable to offer any monetary rewards of any kind at this time.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

    13 May, 2020
    B4lc0n3s:
Can't submit to this program and they banned my IP when I found an authentication bypass vulnerability in their sites.

  Latest Patched

 28.05.2020 aff.to
 27.05.2020 gamebanana.com
 26.05.2020 arise.com
 26.05.2020 plantronics.com
 26.05.2020 benditofutbol.com
 25.05.2020 alaneesqatar.qa
 25.05.2020 shorturl.at
 25.05.2020 torrentoon.com
 25.05.2020 www1.eeoc.gov
 25.05.2020 fcrs.treas.gov

  Latest Blog Posts

04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net

  Recent Recommendations

    26 May, 2020
     viewbug:
Thank you Guarav! Very professional on checking our site for bugs and for providing the details in such a professional manner. We appreciate your help making our platform more secure
    26 May, 2020
     redicius:
Tested my site a lot (according to log :) and found an hidden XSS issue in our site.
Thank you!
    26 May, 2020
     chrisjimallen:
Very helpful insights, spotted something I'd overlooked.
    25 May, 2020
     thisismeraul:
Thanks for finding this vulnerability for us. The corporate website is more secure now. Good job!
    25 May, 2020
     VICTOR__Europe:
Thank you for helping us to fix the critical SQL injection.
Friendly contact, thanks for the effort.