Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
734,247 coordinated disclosures
435,733 fixed vulnerabilities
1141 bug bounties with 2,191 websites
20,556 researchers, 1254 honor badges

Eternagame Bug Bounty Program

Eternagame runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Eternagame

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Eternagame and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

eternagame.org

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

None at this time

Testing Requirements:

None at this time

Possible Awards:

None at this time

Special Notes:

If preferred, you may test against our services at eternadev.org (our test/staging environment) which is configured similarly to our production services at eternagame.org.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

Please send reports to [email protected]

General Requirements:

None at this time

Testing Requirements:

While we welcome any vulnerability reports, please abide by the following (this applies to both eternagame.org as well as our staging environment at eternadev.org, as this may occasionally utilize production resources):
- Do not perform testing that will cause service disruption for other users or lead to significant increase in our infrastructure costs, such as through DDoS, other volumetric attacks, or automated vulnerability scanning that leads to excessive traffic. If you have reason to suspect that such vulnerabilities exist by examination through other means or testing that does not significantly exceed normal user activity, please let us know. If you unintentionally create such issues, please notify us immediately with a description of the situation and refrain from continued or further action that impacts our services.
- Access the private information of other users (eg names, emails, and password hashes). For access control and other similar vulnerabilities, please test against accounts that you own (you may create an alternate account for such testing). If you accidentally access such data, stop immediately, do not attempt to access further data, remove all copies of this data you have access to, and contact us with vulnerability information (please redact any private information in your report).

Possible Awards:

None at this time

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 16.01.2021 liveinternet.ru
 16.01.2021 kickit.to
 16.01.2021 sante.fr
 16.01.2021 gehaltsvergleich.com
 16.01.2021 qub.ac.uk
 16.01.2021 bostonglobe.com
 16.01.2021 inshallah.com
 16.01.2021 quantcast.com
 15.01.2021 klerk.ru
 14.01.2021 engineering.com

  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@smiteworks     15 January, 2021
    Twitter smiteworks:
Rajesh was very helpful in providing information and penetration testing on our site. With this information, we were able to harden our infrastructure.
@mhmitu     15 January, 2021
    Twitter mhmitu:
Hi Praveen,
Thanks for the help with the vulnerability. Very fast and friendly contact.
@matrixrewriter     15 January, 2021
    Twitter matrixrewriter:
We had no idea that this vulnerability existed in many PHP-based websites and you kindly reported it to us. Thanks for your help and all the best for your career!
@SilensStudio     14 January, 2021
    Twitter SilensStudio:
Thank you very much for informing us about our access vulnerability! The world needs more good guys like you! A+!
@JoseLev41970568     14 January, 2021
    Twitter JoseLev41970568:
Specialist in web application penetration tester, student and passionate about computer security and ethical hacking.