Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
760,479 coordinated disclosures
440,109 fixed vulnerabilities
1156 bug bounties with 2,215 websites
20,768 researchers, 1259 honor badges

My Account Bug Bounty Program

My Account runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of My Account

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between My Account and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

gruss.ms
trauer.ms
kfzmarkt.ms

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

dsfsdfsdfsdf df sd fsd f

Testing Requirements:

sdf dsf sd fsd fsdfsd f

Possible Awards:

ds fsd fsd fsd fds fsd fsd

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 27.01.2021 kitabxana.me
 27.01.2021 tmdhosting.com
 27.01.2021 mercato.ai
 27.01.2021 vrporn.com
 27.01.2021 rushlimbaugh.com
 27.01.2021 itworld.co.kr
 27.01.2021 gomlab.com
 26.01.2021 mania.kr
 26.01.2021 thepiratebay10.org

  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@FinnPriebe     27 January, 2021
    Twitter FinnPriebe:
Thanks for finding the XML-RPC security issue on the website of our customer. I will keep this in mind for future projects. You help to make the internet safer. Good luck for your further tech career.
@kajichenkoh     27 January, 2021
    Twitter kajichenkoh:
Thank you for pointing out the Click Jacking issue.
The vulnerability has been fixed.
Appreciate it!
@niegit2021     26 January, 2021
    Twitter niegit2021:
Thanks for finding an XSS flaw. We have also implemented the advice with the referrer header. Best regards and stay healthy.
@chris05634528     25 January, 2021
    Twitter chris05634528:
Hunt2behunter submitted pertient, detailed information and replied to emails quickly. Professional and friendly. We recommend working with Hunt2behunter when possible.
@kajichenkoh     24 January, 2021
    Twitter kajichenkoh:
Thank you for pointing out the vulnerability on our website! Very responsive. Appreciate it!