Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
542,517 coordinated disclosures
348,655 fixed vulnerabilities
818 bug bounties with 1,596 websites
16,740 researchers, 1134 honor badges

WWK Bug Bounty Program

WWK runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of WWK

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between WWK and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

No verified websites yet

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Thanks for warning me about possible safety problems.

As a security researcher, we'd like to ask you to keep ethical standards in mind. Test methods that endanger the stability of our service should not be used.

Testing Requirements:

Test methods that endanger or potentially damage the stability of the website, server or data are excluded.

Please take into account proportionality and subsidiarity, or in other words, is the test method reasonable for the purpose and there is no method with a lower risk and the same result.

Possible Awards:

We will reward discoverers of security problems in an appropriate way. However, there is no room for high financial compensation. For example, the reward may consist of credits, a goodie or a voucher.

Special Notes:

Please note we are a small company and don't have extensive resources to reward for security issues. But we are very happy with every help we get keeping our data safe and we try to reward appropriately.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

Found serious security issues that can't be published like SQL injection possibilities? Please report them by mailing to [email protected] and [email protected]

General Requirements:

Thanks for warning me about possible safety problems.

As a security researcher, we'd like to ask you to keep ethical standards in mind. Test methods that endanger the stability of our service should not be used.

Testing Requirements:

Test methods that endanger or potentially damage the stability of the website, server or data are excluded.

Please take into account proportionality and subsidiarity, or in other words, is the test method reasonable for the purpose and there is no method with a lower risk and the same result.

Possible Awards:

We will reward discoverers of security problems in an appropriate way. However, there is no room for high financial compensation. For example, the reward may consist of credits, a goodie or a voucher. The more serious the issue, the higher the reward.

Special Notes:

Please note we are a small company and don't have extensive resources to reward for security issues. But we are very happy with every help we get keeping our data safe and we try to reward appropriately.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 10.07.2020 dotdigital.com
 10.07.2020 pearltrees.com
 10.07.2020 milligazete.com.tr
 10.07.2020 reuters.com
 10.07.2020 groupon.com
 10.07.2020 edeka.de
 10.07.2020 as-1.co.jp
 10.07.2020 scad.edu
 10.07.2020 nodis3.gsfc.nasa.gov
 09.07.2020 plagscan.com

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    10 July, 2020
     Cajun_Lyrics:
Thank you very much for letting me know about the vulnerabilities on my website, It is really appreciated!
    10 July, 2020
     SNTech2:
A big thanks for notifying us of the bug! Much appreciated.
    9 July, 2020
     newstroll_de:
Thanks for reporting the bug in a very professional manner. We appreciate your work that helps us making our service more secure.
    9 July, 2020
     MariStep2:
Great job! :) Thank you for searching for vulnerabilities on our site. Very responsive, attentive and responsible Security Researcher.
    8 July, 2020
     ziduniwien:
Dear Tanzil,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues.
Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.