Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
504,529 coordinated disclosures
275,770 fixed vulnerabilities
699 bug bounties with 1,399 websites
14,259 researchers, 1058 honor badges

Timeweb Bug Bounty Program

Timeweb runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Timeweb

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Timeweb and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

*.timeweb.ru
timeweb.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Out-of-scope vulnerabilities:
-Reports from automated scanners
-Self-XSS affecting only current account
-Vulnerabilities in third-party applications
-Missing HTTP security headers
-Reports that state that software is out of date/vulnerable without a proof of concept
-Vulnerabilities involving active content such as web browser add-ons
-Weak password policies
-Disclosure of information that does not pose a significant risk

Testing Requirements:

Strictly prohibited:
-Social engineering, phishing, physical, or other fraud activities
-DoS/DDoS
-Spam
-Most brute-forcing issues
-Publishing any sensitive information discovered during security testing

Possible Awards:

Currently only Kudos

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 19.02.2020 hana-yume.net
 19.02.2020 travelmath.com
 19.02.2020 ssb.texas.gov
 19.02.2020 clermontfl.gov
 19.02.2020 wikilengua.org
 19.02.2020 rumahdijual.com
 19.02.2020 quackit.com
 18.02.2020 mudah.my
 18.02.2020 sparkfun.com
 18.02.2020 blibli.com

  Latest Blog Posts

10.02.2020 by 0xrocky
Stored XSS on h2biz.net
10.02.2020 by ismailtsdln
SQL Injection Payload List
20.01.2020 by Rando02355205
XSS on "www.alibaba.com" (Alibaba WAF 405) Bypassed.
16.01.2020 by Open Bug Bounty
Brief Recap of Open Bug Bounty’s Record Growth in 2019
12.01.2020 by JCQ_47
WAF Cloudflare Bypass XSS at Nexusmods.com

  Recent Recommendations

    18 February, 2020
     Travelmath:
Great job finding a vulnerability. I have fixed the issue now, thanks for your help!
    18 February, 2020
     MotoDriveTv:
Thanks you Rajesh for reporting a bug without wanting to gain anything from it. Your quick response enabled us to swiftly fix the flaws you found, great help!
    18 February, 2020
     giroud_francois:
Thanks for notifying flaw, and for the answers ! Your support on fixing the issues was helpful... Friendly contact.
    17 February, 2020
     bigwavedave_ca:
Many thanks to k0t for finding and reporting the XSS vulnerability on my website.
    17 February, 2020
     BountyNeuvoo:
Dear,

Thank you for participating in our responsible disclosure program.

You helped us to solve a security vulnerability by informing us directly and delivering comprehensible examples.

We greatly appreciate your assistance in helping us maintain the security of our services.

Best regards