Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
760,731 coordinated disclosures
440,164 fixed vulnerabilities
1156 bug bounties with 2,215 websites
20,769 researchers, 1260 honor badges

Website bug Bounty Bug Bounty Program

Website bug Bounty runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Website bug Bounty

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Website bug Bounty and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

*.newesc.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Exclusion of self-XSS

Testing Requirements:

Restriction to use vulnerability scanners

Possible Awards:

Recommendation in researcher's profile

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 27.01.2021 gahanna.gov
 27.01.2021 kitabxana.me
 27.01.2021 tmdhosting.com
 27.01.2021 mercato.ai
 27.01.2021 vrporn.com
 27.01.2021 rushlimbaugh.com
 27.01.2021 itworld.co.kr
 27.01.2021 gomlab.com
 26.01.2021 mania.kr

  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@FinnPriebe     27 January, 2021
    Twitter FinnPriebe:
Thanks for finding the XML-RPC security issue on the website of our customer. I will keep this in mind for future projects. You help to make the internet safer. Good luck for your further tech career.
@kajichenkoh     27 January, 2021
    Twitter kajichenkoh:
Thank you for pointing out the Click Jacking issue.
The vulnerability has been fixed.
Appreciate it!
@niegit2021     26 January, 2021
    Twitter niegit2021:
Thanks for finding an XSS flaw. We have also implemented the advice with the referrer header. Best regards and stay healthy.
@chris05634528     25 January, 2021
    Twitter chris05634528:
Hunt2behunter submitted pertient, detailed information and replied to emails quickly. Professional and friendly. We recommend working with Hunt2behunter when possible.
@kajichenkoh     24 January, 2021
    Twitter kajichenkoh:
Thank you for pointing out the vulnerability on our website! Very responsive. Appreciate it!