Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,704,748 coordinated disclosures
1,383,327 fixed vulnerabilities
1,991 bug bounty programs, 3,919 websites
47,062 researchers, 1,651 honor badges

Level365 Bug Bounty Program

Level365 runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Level365

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Level365 and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

365sip.com
level365.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

All vulnerabilities must include either a Proof of Concept, or reasonable steps to reproduce the vulnerability. Any submissions not including a PoC or steps will be closed.

Testing Requirements:

Automated scanning is prohibited under the terms of our Vulnerability Disclosure Program.

Possible Awards:

Possible rewards range from kudos and being added to our Hall of Fame, to potential payouts based on the severity of the issue.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

Please email any additional information to security at level365 dot com and sign with PGP. https://www.level365.com/gpg/security-at-level365-pubkey-2FA5F620.txt

PGP Key:

Show key

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=8c3v
-----END PGP PUBLIC KEY BLOCK-----

General Requirements:

All vulnerabilities must include either a Proof of Concept, or reasonable steps to reproduce the vulnerability. Any submissions not including a PoC or steps will be closed.

Testing Requirements:

Automated scanning is prohibited under the terms of our Vulnerability Disclosure Program.

Possible Awards:

Possible rewards range from kudos and being added to our Hall of Fame, to potential payouts based on the severity of the issue.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 26.04.2024 news.gov.mb.ca
 26.04.2024 mdanderson.org
 25.04.2024 seeu.edu.mk
 25.04.2024 xaxim.sc.gov.br
 25.04.2024 lacerdopolis.sc.gov.br
 24.04.2024 tap.mk.gov.lv
 23.04.2024 data.aad.gov.au
 23.04.2024 bitporno.to
 23.04.2024 sys01.lib.hkbu.edu.hk
 23.04.2024 srvm.gov.za

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
    pubpharm:
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!