Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 454,221 coordinated disclosures
242,780 fixed vulnerabilities
601 bug bounties with 1221 websites
12,269 researchers, 960 honor badges

Domsys Bug Bounty Bug Bounty Program

Domsys Bug Bounty runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Domsys Bug Bounty

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Domsys Bug Bounty and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

beta.domsys.eu

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Non specific requirements.

Test ONLY on: https://beta.domsys.eu
This is continuously updated.

Testing Requirements:

As first, we would like to discover serious/critical bugs. We are also interested for lower severity issues.

No DDoS, no service/server intensive attacks - it is not about bug, but only about bottleneck.

Please do not report SPF/CAA issues, there are not "bugs" for us.
CAA is not supported by our DNS provider.
SPF is not currently possible to define for domsys.eu.

Possible Awards:

We offer $10 - $100 based on severity of bug.

Special Notes:

Use these credentials:

Test ONLY on: https://beta.domsys.eu
This is continuously updated.


Username/email: [email protected]
Password: b33W3Sqp
Please do not change password, this account can be shared. More users can be logged in one time.

Domsys is almost translated to English.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

Please send this kind of vulnerabilities to the email:
[email protected]

General Requirements:

Non specific requirements.

Test ONLY on: https://beta.domsys.eu
This is continuously updated.

Testing Requirements:

As first, we would like to discover serious/critical bugs. We are also interested for lower severity issues.

No DDoS, no service/server intensive attacks - it is not about bug, but only about bottleneck.

Possible Awards:

We offer up to $1000 based on severity of bug.

Special Notes:

Use these credentials:

Test ONLY on: https://beta.domsys.eu
This is continuously updated.

Username/email: [email protected]
Password: b33W3Sqp
Please do not change password, this account can be shared. More users can be logged in one time.

Domsys is almost translated to English.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

    17 July, 2019
    aqibshah:
reported xss via mail. check it,
    2 July, 2019
    S3CUR1TY101:
i send a xss bug they are openbugbounty manually checking it.

  Latest Patched

 19.10.2019 day.az
 18.10.2019 thepiratebay10.org
 18.10.2019 ittefaq.com.bd
 18.10.2019 tutorialspoint.com
 18.10.2019 meteoprog.ua
 18.10.2019 atbmarket.com
 18.10.2019 karar.com
 18.10.2019 wine-searcher.com
 17.10.2019 smartbox.com
 17.10.2019 mightytext.net

  Latest Blog Posts

17.10.2019 by geeknik
The "S" in IOT is for Security
16.10.2019 by darknetguy
Best XSS Vectors
01.10.2019 by Renzi25031469
#Security 100%
18.09.2019 by Leon
SSRF | Reading Local Files from DownNotifier server
13.09.2019 by drok3r
Collection of information | Google Hacking and Dorks basic

  Recent Recommendations

    18 October, 2019
     Cineca1969:
Thank you 0xrocky for identifying a vulnerability and making us aware of it. Great security researcher to work with. Keep up the good work!
    17 October, 2019
     CosimoGdM:
A kudos to 0xrocky for his professional work in not using the identified vulnerabilities and alerting us
    17 October, 2019
     tschipie:
Thanks for the hint :)
Good work.
    17 October, 2019
     nickinckin:
Thanks to 0xrocky for identifying the vulnerability. Now we patched the vulnerability.
    17 October, 2019
     cloudrexx:
Thank you very much for making us aware of the issue and providing us a high quality vulnerability report which helped us identify the source of the vulnerability right away.