Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 343,208 coordinated disclosures
197,171 fixed vulnerabilities
472 bug bounties with 947 websites
9,679 researchers, 871 honor badges

The Atlantic Bug Bounty Program

The Atlantic runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of The Atlantic

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between The Atlantic and researchers.

Bug bounty program allow all submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

theatlantic.com
*.theatlantic.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

No technology is perfect, and The Atlantic believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Disclosure Policy

- Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
- Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
- Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.

Testing Requirements:

While researching, we'd like to ask you to refrain from:

- Denial of service
- Spamming
- Social engineering (including phishing) of Atlantic Media staff or contractors
- Any physical attempts against Atlantic Media property or data centers

Possible Awards:

If we judge a security issue to be valid and sufficiently serious, we will leave a favorable recommendation on the researcher's profile.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 25.04.2019 1x.com
 25.04.2019 verizon.com
 25.04.2019 vpnmentor.com
 25.04.2019 leprogres.fr
 25.04.2019 ivss.gob.ve
 25.04.2019 discogs.com
 25.04.2019 rent.com
 25.04.2019 ub.edu
 24.04.2019 autocarindia.com
 24.04.2019 historydaily.org

  Latest Blog Posts

24.04.2019 by WHOISbinit
Stored Cross-site Scripting (XSS) vulnerability in Charitybuzz.com
24.04.2019 by WHOISbinit
Stored Cross-site Scripting (XSS) vulnerability in 1MB.site
24.04.2019 by WHOISbinit
I was able to Set the Date beyond the Possible Date on Facebook - Informative Issue
24.04.2019 by WHOISbinit
How I was able to Discover a Stored Cross-site Scripting (XSS) vulnerability in Flaticon
22.04.2019 by WHOISbinit
How I was able to create Unauthorized Comments on Facebook Live Stream

  Recent Recommendations

    25 April, 2019
     mlerley:
Thanks for finding these vulnerabilities!
    24 April, 2019
     AniDBStatus:
Thank you for reporting this bug. We appreciate your work!
    23 April, 2019
     itsecop:
Thanks OPASF, for pointed out XSS the vulnerability on our website!
Your input was very much appreciated!
    23 April, 2019
     itsecop:
Thanks m4rcol4vi, for pointed out the XSS vulnerability on our website!
Your input was very much appreciated!
    23 April, 2019
     buerofuenf:
Felipe found a XSS security vulnerability in one of our customers site. We fixed it accordingly. He was very fast in answering and very supportive. Thank you very much, your help is highly appreciated! We will keep you in mind for future security checks on other websites.