Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,702,847 coordinated disclosures
1,382,137 fixed vulnerabilities
1,990 bug bounty programs, 3,918 websites
46,766 researchers, 1,651 honor badges

Unikrn Bug Bounty Program

Unikrn runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Unikrn

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Unikrn and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

*.unikrn.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:


# Scope Exclusions (are not eligible for a reward)
* DNS related or HTTP(S) Header related reports
* Reports relating to self-DoS issues (as in, only the person doing the action is denied service)
* Reports relating to self-Exploit issues (as in, only the logged in person doing the action is exploited in a non sticky fashion)
* Reports of the same issue in an alias domain - if there already is a open report for the same issue on another domain
* Server/Software version disclosure
* login csrf / logout csrf
* Email spoofing (Dmarc/SPF/DKIM)
* Reflected file download
* Clickjacking on emtpy or stage sites (read: must have high real world impact)
* Flaws affecting out-of-date browsers and plugins
* Publicly accessible login panels or html, js,..
* CSP Policy Weaknesses
* TabNabbing Rel=“noopener”
* HTTP Public Key Pinning
* We use s3 buckets to temporary store files people provided. This files expire and should never transition into anything we deliver as files. As long as you can not show a report where this is the case (we deliver this file or url to someone who did not upload this file) its not relevant. The usecase then is not different to an attacker creating his own s3 bucket and linking people to the file he uploaded (if you have reasons to disagree with this assessment please open an report about it)
* Vulnerabilities in 3rd party libraries without working exploit against our apps/servers
* Recently disclosed 0-day vulnerabilities
* Vulnerabilities on sites hosted by third parties, unless they lead to a vulnerability on our scoped domains
* Bugs that have not been responsibly investigated and reported or are directly copy and paste from automated scann reports
* Bugs already known to us, or already reported by someone else (reward goes to first reporter)
* Issues that aren't reproducible
* Issues that we can't reasonably be expected to do anything about

Testing Requirements:

* If you report on a network attack please provide a CURL command line (if possible)
* Researchers are more likely to earn a larger reward by demonstrating how a vulnerability can be exploited to maximum effect
* If you exploit something using a custom crafted request (and it does not affect an api), please describe a real world user impact visiting with a browser
* Please allow 3 business days for us to respond before sending another question on it
* Make sure to correctly classify the report severity. Refrain from reporting an severity above medium, if the report has medium or limited impact towards real users of a unikrn service

Possible Awards:

To show our appreciation of responsible security researchers, Unikrn offers a monetary bounty for reports of qualifying security vulnerabilities. Reward amounts will vary based upon the severity of the reported vulnerability, and eligibility is at our sole discretion.

Special Notes:

Unikrn built the most technologically advanced sportsbook for esports. We run the best fully-regulated and licensed esports bookmaker on the planet. No technology is perfect, and Unikrn believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

You can send them to [email protected]

PGP Key:

Show key

https://unikrn.com/unikrn.asc

General Requirements:


# Scope Exclusions (are not eligible for a reward)
* DNS related or HTTP(S) Header related reports
* Reports relating to self-DoS issues (as in, only the person doing the action is denied service)
* Reports relating to self-Exploit issues (as in, only the logged in person doing the action is exploited in a non sticky fashion)
* Reports of the same issue in an alias domain - if there already is a open report for the same issue on another domain
* Server/Software version disclosure
* login csrf / logout csrf
* Email spoofing (Dmarc/SPF/DKIM)
* Reflected file download
* Clickjacking on emtpy or stage sites (read: must have high real world impact)
* Flaws affecting out-of-date browsers and plugins
* Publicly accessible login panels or html, js,..
* CSP Policy Weaknesses
* TabNabbing Rel=“noopener”
* HTTP Public Key Pinning
* We use s3 buckets to temporary store files people provided. This files expire and should never transition into anything we deliver as files. As long as you can not show a report where this is the case (we deliver this file or url to someone who did not upload this file) its not relevant. The usecase then is not different to an attacker creating his own s3 bucket and linking people to the file he uploaded (if you have reasons to disagree with this assessment please open an report about it)
* Vulnerabilities in 3rd party libraries without working exploit against our apps/servers
* Recently disclosed 0-day vulnerabilities
* Vulnerabilities on sites hosted by third parties, unless they lead to a vulnerability on our scoped domains
* Bugs that have not been responsibly investigated and reported or are directly copy and paste from automated scann reports
* Bugs already known to us, or already reported by someone else (reward goes to first reporter)
* Issues that aren't reproducible
* Issues that we can't reasonably be expected to do anything about

Testing Requirements:

* If you report on a network attack please provide a CURL command line (if possible)
* Researchers are more likely to earn a larger reward by demonstrating how a vulnerability can be exploited to maximum effect
* If you exploit something using a custom crafted request (and it does not affect an api), please describe a real world user impact visiting with a browser
* Please allow 3 business days for us to respond before sending another question on it
* Make sure to correctly classify the report severity. Refrain from reporting an severity above medium, if the report has medium or limited impact towards real users of a unikrn service

Possible Awards:

To show our appreciation of responsible security researchers, Unikrn offers a monetary bounty for reports of qualifying security vulnerabilities. Reward amounts will vary based upon the severity of the reported vulnerability, and eligibility is at our sole discretion.

Special Notes:

Unikrn built the most technologically advanced sportsbook for esports. We run the best fully-regulated and licensed esports bookmaker on the planet. No technology is perfect, and Unikrn believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 17.04.2024 maps.bolton.gov.uk
 16.04.2024 fishwatch.gov
 16.04.2024 renewableenergy.gov.bd
 13.04.2024 lit.am
 13.04.2024 overnewton.vic.edu.au
 13.04.2024 catalog.edu.pl
 13.04.2024 brandee.edu.vn
 12.04.2024 id.mta.gov.mv

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
    pubpharm:
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    20 March, 2024
    TechVitaverdura:
Great exchanges with this person, thank you for your help and your report