Open Bug Bounty selected among the
Top 5 Bug Bounty programs to watch
in 2021 by The Hacker News

For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
956,756 coordinated disclosures
601,572 fixed vulnerabilities
1,318 bug bounty programs, 2,629 websites
22,660 researchers, 1,302 honor badges

Choice Stationery Supplies Bug Bounty Program

Choice Stationery Supplies runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Choice Stationery Supplies

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Choice Stationery Supplies and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

choicestationery.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Please contact us via the OpenBugBounty website with verified proof of the issue so that we can look into it, fix it and pass our thanks. We WILL NOT accept nor reply to requests sent directly to ourselves, due to a large amount of requests that we cannot verify.

ONLY CONTACT US VIA OPEN BUG BOUNTY's WEBSITE - DO NOT contact us directly by ANY MEANS, including but NOT limited to Live Chat, Facebook, e-mail, etc.

Testing Requirements:

Vulnerabilities should be verified as authentic, not automated results of pen-tests and other such tests. We will only accept reports that have been replicated by the Open Bug Bounty program.

DO NOT use excessive brute force scanners, DO NOT overly scan our website so that it slows down or causes issues for our customers. While we appreciate that people are trying to find issues with our site, we have customers who need to use it without issues or slowdowns.

Possible Awards:

While we do not have a definitive list of awards, we are more than happy to give thanks and/or award genuine authentic reports of Vulnerabilities on our website.

Special Notes:

Please contact us via the OpenBugBounty website with verified proof of the issue so that we can look into it, fix it and pass our thanks. We WILL NOT accept nor reply to requests sent directly to ourselves.

ONLY CONTACT US VIA OPEN BUG BOUNTY's WEBSITE - DO NOT contact us directly by ANY MEANS, including but NOT limited to Live Chat, Facebook, e-mail, etc.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 07.05.2021 creativecommons.org
 07.05.2021 baliza.go.gov.br
 07.05.2021 pequizeiro.to.gov.br
 07.05.2021 castanheiras.ro.gov.br
 07.05.2021 huji.ac.il
 07.05.2021 www6.caixa.gov.br
 07.05.2021 nasatheme.com
 07.05.2021 itaipulandia.pr.gov.br

  Latest Blog Posts

25.04.2021 by ParanjpeSanmarg
Testing Subdomain Takeover Vulnerability
11.04.2021 by Open Bug Bounty
Better Notifications Mechanism
28.03.2021 by febin_rev
Windows Stack Buffer Overflow in a real life app — Exploit development — CloudMe_1.11.2 Buffer Overflow-CVE-2018–6892
10.02.2021 by Renzi25031469
Sysadminotaur nº88
10.02.2021 by Open Bug Bounty
Higher Submissions Quality Standard

  Recent Recommendations

@obb20210429     6 May, 2021
    Twitter obb20210429:
Thanks for a quick and useful report that helped us find and resolve the issue.
@MrGviana     6 May, 2021
    Twitter MrGviana:
Ricardo, thank you for reporting vulnerabilities and helping me to solve them.
@aguiar_security     6 May, 2021
    Twitter aguiar_security:
Hey Ricardo, thanks for helping us :)
@aguiar_security     6 May, 2021
    Twitter aguiar_security:
Hey Ricardo, thanks for helping us :)
@_Kkommi     6 May, 2021
    Twitter _Kkommi:
Thank you for letting us know about the issue and helping to make the web a safer place