Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 328,799 coordinated disclosures
190,792 fixed vulnerabilities
408 bug bounties with 864 websites
9,210 researchers, 854 honor badges

Porkbun LLC Bug Bounty Program

Porkbun LLC runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Porkbun LLC

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Porkbun LLC and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

porkbun.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Please view our bug bounty program at https://porkbun.com/products/bug_bounty

Testing Requirements:

Please view our bug bounty program at https://porkbun.com/products/bug_bounty

Possible Awards:

Please view our bug bounty program at https://porkbun.com/products/bug_bounty

Special Notes:

Thank you :)

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

Please view our bug bounty program at https://porkbun.com/products/bug_bounty

General Requirements:

Please view our bug bounty program at https://porkbun.com/products/bug_bounty

Testing Requirements:

Please view our bug bounty program at https://porkbun.com/products/bug_bounty

Possible Awards:

Please view our bug bounty program at https://porkbun.com/products/bug_bounty

Special Notes:

Thank you :)

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

  Latest Patched

 23.03.2019 redcross.org
 23.03.2019 etsu.edu
 23.03.2019 dump.xxx
 23.03.2019 vipon.com
 23.03.2019 jeuxjeuxjeux.fr
 23.03.2019 domainnamesales.com
 23.03.2019 bonprix.de
 23.03.2019 discogs.com

  Latest Blog Posts

22.03.2019 by HackerGautam
TLS 1.3 Genesis, Mechanism and Working
19.03.2019 by Open Bug Bounty
GDPR PII exposure can now be securely reported via Open Bug Bounty
24.02.2019 by ismailtsdln
Apple XSS Vulnerability - Proof of Concept (PoC)
24.02.2019 by ismailtsdln
How do you use an xss as a keylogger ?
23.02.2019 by ismailtsdln
Everything about XSS is in this source!

  Recent Recommendations

    22 March, 2019
     jcfmachado:
Thank you for your time and notification.
    19 March, 2019
     rogerdc01:
Ezio has helped me with a vulnerability. Answered very fast after some questions and showed the way to examine the issue. Very professional!
    19 March, 2019
     interactmultim1:
Thank you k0t for reporting this bug. We appreciate your work!
    19 March, 2019
     CoreInstance:
Armin, vielen Dank für deine professionelle Unterstützung! Dank deiner Hilfe, konnten wir die Schwachstelle bei unserem Kunden direkt beheben.
    18 March, 2019
     ArnY:
Un grand merci pour votre aide. Suite à votre retour rapide et précis la faille a été corrigée rapidement par nos équipes.