Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 343,208 coordinated disclosures
197,171 fixed vulnerabilities
472 bug bounties with 947 websites
9,679 researchers, 871 honor badges

A1 Telekom Austria Bug Bounty Program

A1 Telekom Austria runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of A1 Telekom Austria

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between A1 Telekom Austria and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

*.a1.net
a1.net

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

• You can exploit the vulnerability for demonstration purpose, but this should not lead to service outages (DoS) as well as the manipulation or loss of data. The purpose of the demonstration should show the attack vector and should not cause any damage.
• Do not share gathered information with third parties.
• Please make sure to provide enough information so that we can reproduce the issue. A short description including a problem description and the URL/IP of the affected system should be sufficient.

Testing Requirements:

• These areas/fields are not part of the responsible disclosure process:
o Physical security
o Social engineering
o Distributed Denial of Service (DDoS) attacks
o Spam & Phishing
o Exploiting vulnerabilities on systems which are dedicated to our customers

Possible Awards:

At the moment there are no rewards, but this might change in the near future.

Special Notes:

https://www.a1.net/responsible-disclosure

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 25.04.2019 1x.com
 25.04.2019 verizon.com
 25.04.2019 vpnmentor.com
 25.04.2019 leprogres.fr
 25.04.2019 ivss.gob.ve
 25.04.2019 discogs.com
 25.04.2019 rent.com
 25.04.2019 ub.edu
 24.04.2019 autocarindia.com
 24.04.2019 historydaily.org

  Latest Blog Posts

24.04.2019 by WHOISbinit
Stored Cross-site Scripting (XSS) vulnerability in Charitybuzz.com
24.04.2019 by WHOISbinit
Stored Cross-site Scripting (XSS) vulnerability in 1MB.site
24.04.2019 by WHOISbinit
I was able to Set the Date beyond the Possible Date on Facebook - Informative Issue
24.04.2019 by WHOISbinit
How I was able to Discover a Stored Cross-site Scripting (XSS) vulnerability in Flaticon
22.04.2019 by WHOISbinit
How I was able to create Unauthorized Comments on Facebook Live Stream

  Recent Recommendations

    25 April, 2019
     mlerley:
Thanks for finding these vulnerabilities!
    24 April, 2019
     AniDBStatus:
Thank you for reporting this bug. We appreciate your work!
    23 April, 2019
     itsecop:
Thanks OPASF, for pointed out XSS the vulnerability on our website!
Your input was very much appreciated!
    23 April, 2019
     itsecop:
Thanks m4rcol4vi, for pointed out the XSS vulnerability on our website!
Your input was very much appreciated!
    23 April, 2019
     buerofuenf:
Felipe found a XSS security vulnerability in one of our customers site. We fixed it accordingly. He was very fast in answering and very supportive. Thank you very much, your help is highly appreciated! We will keep you in mind for future security checks on other websites.