Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,647,947 coordinated disclosures
1,296,509 fixed vulnerabilities
1,895 bug bounty programs, 3,774 websites
42,012 researchers, 1,626 honor badges

Alien-Scripts Bug Bounty Program

Alien-Scripts runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Alien-Scripts

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Alien-Scripts and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

*.alien-scripts.de

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Ensure to consistently send a functional Proof of Concept (PoC) accompanied by a CVSS score for vulnerability assessments. Include detailed screenshots to enhance clarity. Additionally, furnish concise remediation guidelines to facilitate prompt and effective resolution of identified issues. This comprehensive approach streamlines the mitigation process for optimal security outcomes and quick resolution.

Testing Requirements:

Comply with limitations on vulnerability scanner usage to ensure responsible testing. Strictly abstain from executing social engineering attacks on us or our customers, emphasizing ethical practices and fostering a secure testing environment for everyone involved. These measures uphold ethical standards, contributing to a thorough yet conscientious approach to cybersecurity evaluations.

Possible Awards:

We will provide recommendations for contributions in your researcher profiles, enhancing your credibility. We do not have an acknowledge page on our website.
Acknowledge budget constraints as a solo entity, clarifying the inability to offer substantial monetary rewards. Please feel free to tell us your expectations or if we can offer recommendations on other ways to show our gratitude.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 04.12.2023 aiimsraipur.edu.in
 03.12.2023 remote.kds.vic.edu.au
 03.12.2023 sara.health.nsw.gov.au
 03.12.2023 titan.csit.rmit.edu.au
 03.12.2023 buyict.gov.au
 02.12.2023 shipperscouncil.gov.ng
 02.12.2023 unapiquitos.edu.pe
 02.12.2023 pnjh.phc.edu.tw

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    23 November, 2023
    Renard007:
Grace à Hatim_cf on a pu corrigé une faille mineure de sécurité.
    22 November, 2023
    nag:
On behalf of our users on one of the pages hosted at users.encs.concordia.ca, I'd like to thank Niko for his effort in finding and responsibly reporting an XSS vuln in one of our user's sites. The XSS was quickly patched after Niko's detailed report making the web a safer place again. Thanks!
    22 November, 2023
    creality:
Ronald identified an XSS vulnerability on our site which could be fixed fast. Thanks for the provided information!
    4 November, 2023
    Enzo:
Thank you for fixing the XSS vulnerability
    13 October, 2023
    Hamza:
I am highly recommending Sajid for web assessments and penetrating testing. Sajid was highly professional and detailed in t heir approach towards finding vulnerabilities.