Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
554,659 coordinated disclosures
356,327 fixed vulnerabilities
841 bug bounties with 1,623 websites
17,324 researchers, 1153 honor badges

EMBL-EBI Bug Bounty Program

EMBL-EBI runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of EMBL-EBI

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between EMBL-EBI and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

*.ebi.ac.uk

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Keeping the information we hold secure is of the utmost importance to EMBL-EBI. We value any contribution made by those outside the organisation in improving the security of our services. We are committed to working with the community to verify, reproduce, and respond to legitimate reported vulnerabilities. We encourage the community to participate in our responsible reporting process which applies to services relating to the following domains:

- ebi.ac.uk

Testing Requirements:

We will assess all reports and investigate those reports satisfying the following criteria. We will make every effort to correct any vulnerability within 6 months. To encourage responsible reporting, we commit that we (EMBL) will not take legal action against you or ask law enforcement to investigate you if you comply with the following Responsible Disclosure Guidelines:

- Reporter to provide details of the vulnerability, including information needed to reproduce and validate the vulnerability and a Proof of Concept (POC)
- Reporter to give us up to 6 months to correct the issue before making any information public
- Reporter to make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our services
- Reporter does not modify or access non-public data, or data that is not theirs
- Reporter to refrain from requesting compensation for reporting vulnerabilities. Upon request we will publicly acknowledge reporter’s responsible disclosure after issues are resolved.
- Reporter to refrain from using automated tools to scan for vulnerabilities, as this can have an adverse effect on other users of our services.

Possible Awards:

Reporter to refrain from requesting compensation for reporting vulnerabilities. Upon request we will publicly acknowledge reporter’s responsible disclosure after issues are resolved.

Special Notes:

We will attempt to respond to your report within 5 working days (we are closed over Christmas and New Year).

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

    13 July, 2019
    bugrep0rt:
I found open FTP with details. share mail for send details. Thank you.
    11 July, 2019
    Hide_khan:
please share your mail address for other report

  Latest Patched

 10.08.2020 da.ai
 10.08.2020 find-job.net
 10.08.2020 radiotimes.com
 10.08.2020 maserati.com
 10.08.2020 erebounicollege.am
 10.08.2020 gq-magazine.co.uk
 10.08.2020 nintendo.com
 10.08.2020 gucci.com
 10.08.2020 blesk.cz
 10.08.2020 bazos.cz

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    10 August, 2020
     msawired:
Thank you for reporting the XSS vulnerability. Your explanations were very helpful, and we were able to resolve the issue in no time.
    6 August, 2020
     Robert_CMI:
Thank you Rajesh for reporting vulnerabilities on our website, your quick and detailed response was very valuable to us!
    6 August, 2020
     StefanCink:
Thanks to @singhnitesh21 we were able to close a vulnerability on our website asap. Thank you!
    5 August, 2020
     kkb5mobile:
Thank you for pointing out the vulnerability.
Thanks to you, I was able to respond safely.
    5 August, 2020
     kkb5mobile:
Thank you for pointing out the vulnerability.
Thanks to you, I was able to respond safely.