Open Bug Bounty selected among the
Top 5 Bug Bounty programs to watch
in 2021 by The Hacker News

For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,008,591 coordinated disclosures
630,356 fixed vulnerabilities
1,352 bug bounty programs, 2,708 websites
23,450 researchers, 1,317 honor badges

Level365 Bug Bounty Program

Level365 runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Level365

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Level365 and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

365sip.com
level365.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

All vulnerabilities must include either a Proof of Concept, or reasonable steps to reproduce the vulnerability. Any submissions not including a PoC or steps will be closed.

Testing Requirements:

Automated scanning is prohibited under the terms of our Vulnerability Disclosure Program.

Possible Awards:

Possible rewards range from kudos and being added to our Hall of Fame, to potential payouts based on the severity of the issue.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

Please email any additional information to security at level365 dot com and sign with PGP. https://www.level365.com/gpg/security-at-level365-pubkey-2FA5F620.txt

PGP Key:

Show key

-----BEGIN PGP PUBLIC KEY BLOCK-----

mQINBF8kMNEBEADY7qVL9Bpg07jnPxGfiZkcToFywYOxP425+wHNjNb6NK/uhgan
jOJFoRBplmHl2U0NUGwgyf2prwyfhHY0l71xTnUB13MDNsxFzhK61FWnMXzKDyVV
L6aCA3Lvb1ZVI2BsTzwcsrW4C9W2RNBQXUT0DmHhV+t5oiWUHAHRrJvlMFbK5e+F
AtrWCWxXQAHpnAInzpFd8kpCMGr1uLPTTna/HXo5Pah2+GH7J/r6Tja78+TTdF3a
2x3ZGTUGiB4XrYLunK8t6awga7SKAaZcLZGbZ8PWFGacCG6OyyPi9K/KN7qLXq5J
6Z6B2AgNixJxCPhtWkrr5Rz5UiCjRXoYg2MbjiF0Qt1hT3XWQ3l8PZhpG816JVWE
5UH8J3rfuba6t9MYahYU9zJ7IAiwPCxhb+sw1gLfIWyMcg5c4NMcs84CKcrH0zVO
KFujCVjTKeOpUx8UfbrqEh0gTzP+S1mHQrXpn+t9Ol4u5rH+ab2Ov5utdVXfCbBF
u0uwRO2GLMibyCq6sGpQ2aGYSPv58hYMap7PGDAz8z9oDmrUrqefACc+ar4UwE+t
inCYp2rttsvS5K6GKldGkpeyb4ZajaUWQd9rmt/umYjFOM/EuV76MqjIz6LedFlk
VW5VqSw1b8U7IBwf6Xo6KZgGU7o8iQ0ELIauFGXBBomhzRDm7x6tcvT8KQARAQAB
tExMZXZlbDM2NSBTZWN1cml0eSAoRm9yIFNlY3VyaXR5LXJlbGF0ZWQgaXNzdWVz
IG9ubHkpIDxzZWN1cml0eUBsZXZlbDM2NS5jb20+iQJUBBMBCAA+FiEEEvDkgv+S
QkWGXzI2w7561C+l9iAFAl8kMNECGwMFCRLOpgAFCwkIBwIGFQoJCAsCBBYCAwEC
HgECF4AACgkQw7561C+l9iBS5xAAzlBA+Vyy1JrjU2eWqiGKq3p2zTRENiRsDLkX
1L1j5iB+T5x7qhbuyaeeJmBvsyvh+2hTnxdVcYwlLPr8+T62H9kk+IGx+Wkt87AL
IQUKZyN6/Eoir7IbsM+C0RrD6JK7yWj//+JBfG/k59ViRPHWO5YxDnaClBQ8HrmA
V8FJUdardGESkVMU0zxOY3193xaQRmdlaoNpQpUKiES2iVLJdyu+NKlzP7xHK7wt
az6fuIe6RRHitiQK0hxG9yUBH20LEeDObSKT+vOuzrDGsHSTvDuSg0wElHWvpmEd
mEMCNm8aRLAfehd92rtXJQQ2yLuUcPTp8V+LqG3rEc4IM2hAyTYMOYBPOT8IyvRC
/LuyVwBw16mlCJHVjBmG4aCdWp+rb4SfuFvRrfgpujCcEg+Cc816kiF54z3Bfruz
7mMKfoXieUnhvEW3qr3+dF9DVty10JYTp1k9ICvBcjMJ5K2zT8Jnuu+psP932LDL
abVbXG/XQpMVVeBYQQNA6T3N417MeDsPazmvznansF3W4ns+4x6ZEj39pgiIOhIb
ozcb+j4L/pS7Upw80JKO5H5pVa+ddA7dLrhREFqQ8KIyAXlg2tJGJarGeNZdK6G/
4yYz9VHHHSOqtO/jEHr/OQnfwhlvQkSIrBUupbv6UZZppx0BSTTiBG3r9D1YFJdt
Pbp5Mty5Ag0EXyQw0QEQAKivGdSU/bvI28SIXsf3M//im78X+Stqbt5pKbBkTP6I
TT6IctngxRk/hw/pgat1mdBGq2fDuVTUeujJ1q2VQk1qEhQf7bo+ywoFjUirZSj5
felrvcphPpiGAcyHOH9teSfp6Yjd8IvwehU4mOqBZiyplm1clYBMkCACcZIwT3lI
QwPltfvXv7pnFzfuvsMaSwHCMzAlJIpXyoPcThaSXxCmaFIaXBrHQ+EBzS1gjZsI
A+NfDQkjc+WlX18ZT4hENMCcOPH6G0xT3guf+Cio2ufR52q4MzuQ4uLbQdunKlov
Q4wPniWk+LWikJoS93h70Dv6kYUFWDFXgaAhfIe/raVRjPnkq+TxaYiYBDaSq3yz
+prRmQ3kiigN9uVCuM46GtGzRvoS1dvsdgmD+aka/fnRNfxqqaBW6bHawhnkYFwX
7+T3aNdQz+s8zPzOE8TmNOXuGUmUyR7SgpQdxsWrFfLeKVl6EAgy9oIC0bx8oDoG
VdQrIZvEFTQmre3f3spstu7bUCC5ajYFdr16xRZOKRmA8Ya7VDKd33jxyUbYxcvV
ZKuBu7Xibq14hVxjPtT1oTS688uW1WcNAK4hvILDxCEIjDsHkYslfjR2kLxCCapD
EyR/jVuyfX7I+wk6RTzj7ryE8KLiqZ5GWD8dn+NngN/xQG6oVJjW6wl2IamNEcUr
ABEBAAGJAjwEGAEIACYWIQQS8OSC/5JCRYZfMjbDvnrUL6X2IAUCXyQw0QIbDAUJ
Es6mAAAKCRDDvnrUL6X2IBBXEACCykKc1Bem/WlBrEwTezXWUtURRDBexlHfA2ro
3ASqaHmmnJUcakwPrcApCoT2JtA4Lr8/DfUn9XjJCkqKqr6MG3LYlXBkWlTHiRYn
NChAOYP4huvUkD++UL6w8OudqgJdsfYMe9UsBzltMjd+imsEQY3ZtMXrwFIFQO3o
i/ljVmIIHyerTs8brGjcggy2YOV3EcVArVOvxnJ+b2iGw5WHeLkwSywUHssQqXgT
W2TjQPXzrwE3gO4l28myoWHCAm/thTmeC/L+br7vs1W4hAZBnHclstVyeYBhJUrD
G/MRNvDarN+z+SwPW0Km0WllAXqlrFKNARogzXTvRINP1/hliZ3vQUkFelAceNh2
Bc4Ld+cwwZnRI7KvFVLRIycbmtbScqDX4GJB0+NENpMYrs3Z+7+j6CaS/s4DujbN
KvK93qPNX3TJlLOt39yijQlaHcrqNCNzV5O1bex4Axj5jay+HmO0oCdEHYAfR2Uw
BLz8/L+REm6EiXQwJswwOoQMuBlxCCeyXlA9rAM+YG/7GmL3vz5fZdOg8/7nWLO/
YnUWlcoklmI3Nv1l2ODVtrI5WvQWx5lRwA6eOaBdzpOhZ7qRZUaXtc/fzHkArR+5
/InKFEBKQt3rKuJHQkxQuJM4CUGCu0SNVPFJO54MEC02qpWL+vny4GoMuHaG7b19
6LEpEQ==
=8c3v
-----END PGP PUBLIC KEY BLOCK-----

General Requirements:

All vulnerabilities must include either a Proof of Concept, or reasonable steps to reproduce the vulnerability. Any submissions not including a PoC or steps will be closed.

Testing Requirements:

Automated scanning is prohibited under the terms of our Vulnerability Disclosure Program.

Possible Awards:

Possible rewards range from kudos and being added to our Hall of Fame, to potential payouts based on the severity of the issue.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 24.06.2021 meteociel.fr
 23.06.2021 itworld.co.kr
 23.06.2021 emmys.com
 23.06.2021 digitaljournal.com
 23.06.2021 royaloakindia.com
 22.06.2021 landesmuseen.sh
 22.06.2021 stylicy.com
 22.06.2021 wordplays.com
 22.06.2021 sallybeauty.com
 22.06.2021 classtools.net

  Latest Blog Posts

25.05.2021 by 0xrocky
Google XSS Game
25.05.2021 by ShivanshMalik12
Testing for XSS (Cross Site Scripting)
25.05.2021 by darklotuskdb
Easy XSS On Mostly Educational Websites Via Moodle
25.04.2021 by ParanjpeSanmarg
Testing Subdomain Takeover Vulnerability
11.04.2021 by Open Bug Bounty
Better Notifications Mechanism

  Recent Recommendations

@Xupypr13     23 June, 2021
    Twitter Xupypr13:
Nagashree found a vulnerabilities on our web resource and acted ethically by reporting it to us, as well as providing the information we needed to reproduce the issue.

Thank you for pointing this out!
@darione90     19 June, 2021
    Twitter darione90:
Many thanks to garlet_marco for finding an XSS vulnerability on our website!
@RyanBoehm12     16 June, 2021
    Twitter RyanBoehm12:
Vighnesh Gupta was professional, considerate, and thorough in helping us resolve a security flaw on our website. He communicated with in a timely manner, and provided all necessary support to fix the issue. I highly recommend him.
@rus_cert     16 June, 2021
    Twitter rus_cert:
Thanks for informing us about the vulnerability and providing helpful details :-)
@Cyber91998806     16 June, 2021
    Twitter Cyber91998806:
He responded to my mails quickly and helped us how to fix the vulnerability in a professional way. I recommended this guy.