Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 343,316 coordinated disclosures
197,201 fixed vulnerabilities
472 bug bounties with 947 websites
9,684 researchers, 871 honor badges

Pepperl+Fuchs GmbH Bug Bounty Program

Pepperl+Fuchs GmbH runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Pepperl+Fuchs GmbH

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Pepperl+Fuchs GmbH and researchers.

Bug bounty program allow all submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

pepperl-fuchs.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

No general requirements

Testing Requirements:

No testing requirements

Possible Awards:

our infinite thanks for the efforts. recommendation in researcher\'s profile.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 25.04.2019 1x.com
 25.04.2019 verizon.com
 25.04.2019 vpnmentor.com
 25.04.2019 leprogres.fr
 25.04.2019 ivss.gob.ve
 25.04.2019 discogs.com
 25.04.2019 rent.com
 25.04.2019 ub.edu
 24.04.2019 autocarindia.com
 24.04.2019 historydaily.org

  Latest Blog Posts

24.04.2019 by WHOISbinit
Stored Cross-site Scripting (XSS) vulnerability in Charitybuzz.com
24.04.2019 by WHOISbinit
Stored Cross-site Scripting (XSS) vulnerability in 1MB.site
24.04.2019 by WHOISbinit
I was able to Set the Date beyond the Possible Date on Facebook - Informative Issue
24.04.2019 by WHOISbinit
How I was able to Discover a Stored Cross-site Scripting (XSS) vulnerability in Flaticon
22.04.2019 by WHOISbinit
How I was able to create Unauthorized Comments on Facebook Live Stream

  Recent Recommendations

    25 April, 2019
     mlerley:
Thanks for finding these vulnerabilities!
    24 April, 2019
     AniDBStatus:
Thank you for reporting this bug. We appreciate your work!
    23 April, 2019
     itsecop:
Thanks OPASF, for pointed out XSS the vulnerability on our website!
Your input was very much appreciated!
    23 April, 2019
     itsecop:
Thanks m4rcol4vi, for pointed out the XSS vulnerability on our website!
Your input was very much appreciated!
    23 April, 2019
     buerofuenf:
Felipe found a XSS security vulnerability in one of our customers site. We fixed it accordingly. He was very fast in answering and very supportive. Thank you very much, your help is highly appreciated! We will keep you in mind for future security checks on other websites.