For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
818,744 coordinated disclosures
462,296 fixed vulnerabilities
1273 bug bounties with 2,430 websites
21,612 researchers, 1277 honor badges

refex.dbcls.jp Bug Bounty Program

refex.dbcls.jp runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of refex.dbcls.jp

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between refex.dbcls.jp and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

refex.dbcls.jp

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

No general requirements

Testing Requirements:

No testing requirements

Possible Awards:

No possible awards

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 27.02.2021 coop.ch
 27.02.2021 tourister.ru
 27.02.2021 paruvendu.fr
 27.02.2021 natal.rn.gov.br
 26.02.2021 lachainemeteo.com
 26.02.2021 vodafone.in
 25.02.2021 esrs.jsc.nasa.gov

  Latest Blog Posts

10.02.2021 by Renzi25031469
Sysadminotaur nº88
10.02.2021 by Open Bug Bounty
Higher Submissions Quality Standard
25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads

  Recent Recommendations

@kNHrpaG66ZaoOcS     26 February, 2021
    Twitter kNHrpaG66ZaoOcS:
Thanks for contacting us about the vulnerability issue.
We've fixed it without any problems.
Thanks for your cooperation and quick response.
Best Regards,
@bb_tw4     25 February, 2021
    Twitter bb_tw4:
Cyber_India informed us via OpenBugBounty about a problem on our Website. Very responsible. Thank you very much!
@HR4YOU_AG     25 February, 2021
    Twitter HR4YOU_AG:
Thanks to @cyber_pramod for reporting an issue with our homepage! Very nice contact!
@simondale101     23 February, 2021
    Twitter simondale101:
Thanks for finding the XSS Bug, which was pretty obscure. I appreciate your responsiveness on the issue :)
@dirqzn     23 February, 2021
    Twitter dirqzn:
Many thanks to Cyber_India for informing us about a vulnerability. Communication was quick and transparent!