Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
505,170 coordinated disclosures
276,072 fixed vulnerabilities
700 bug bounties with 1,400 websites
14,292 researchers, 1057 honor badges

Architectenweb Bug Bounty Program

Architectenweb runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Architectenweb

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Architectenweb and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

architectvanhetjaar.nl
architectenweb.nl

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Any type of vulnerability may be reported.

There is no need to report below issues, we are aware of these.
- We are using an open redirect at /service/externallink.aspx
- There is no minimum password strength for an account, except for minimum characters
- Rate limit for the login page and password reset page
- Incorrect MX and missing DMARC DNS records
- Session does not expire after password change
- Session hijacking
- Web cache deception attack

Testing Requirements:

Please provide POC. There is no need to actually exploit the website, just describe how we can reproduce.

Possible Awards:

You will always get our gratitude. In some cases there may be a small compensation, depending on the severity. Please be advised, our budget for bounties is very limited.

Special Notes:

You can also e-mail us directly at [email protected]

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 20.02.2020 reachlocal.com
 20.02.2020 info.reco.ws
 20.02.2020 job-hunt.org
 19.02.2020 olis.ri.gov
 19.02.2020 ppt.cc
 19.02.2020 cjdropshipping.com
 19.02.2020 koton.com
 19.02.2020 band.uol.com.br
 19.02.2020 myrealtrip.com
 19.02.2020 w3techs.com

  Latest Blog Posts

10.02.2020 by 0xrocky
Stored XSS on h2biz.net
10.02.2020 by ismailtsdln
SQL Injection Payload List
20.01.2020 by Rando02355205
XSS on "www.alibaba.com" (Alibaba WAF 405) Bypassed.
16.01.2020 by Open Bug Bounty
Brief Recap of Open Bug Bounty’s Record Growth in 2019
12.01.2020 by JCQ_47
WAF Cloudflare Bypass XSS at Nexusmods.com

  Recent Recommendations

    19 February, 2020
     UKClimbing:
Thanks for finding the XSS bug. Great communication.
    18 February, 2020
     Travelmath:
Great job finding a vulnerability. I have fixed the issue now, thanks for your help!
    18 February, 2020
     MotoDriveTv:
Thanks you Rajesh for reporting a bug without wanting to gain anything from it. Your quick response enabled us to swiftly fix the flaws you found, great help!
    18 February, 2020
     giroud_francois:
Thanks for notifying flaw, and for the answers ! Your support on fixing the issues was helpful... Friendly contact.
    17 February, 2020
     bigwavedave_ca:
Many thanks to k0t for finding and reporting the XSS vulnerability on my website.