Open Bug Bounty selected among the
Top 5 Bug Bounty programs to watch
in 2021 by The Hacker News

For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,078,599 coordinated disclosures
659,628 fixed vulnerabilities
1,404 bug bounty programs, 2,806 websites
24,759 researchers, 1,358 honor badges

Pagemind Bug Bounty Program

Pagemind runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Pagemind

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Pagemind and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

lismoregallery.org
lismore.nsw.gov.au
begavalley.nsw.gov.au
griffith.nsw.gov.au
clarence.nsw.gov.au
ballina.nsw.gov.au
rtrl.nsw.gov.au
rous.nsw.gov.au
northernriverswaste.com.au
nambuccatourism.com.au
lismorequad.org.au
library.begavalley.nsw.gov.au
gsac.net.au
graftongallery.nsw.gov.au
flatrocktentpark.com.au
disaster.lismore.nsw.gov.au
directory.leeton.nsw.gov.au
clarencecareandsupport.com.au
cainvest.com.au
murrumbidgee.nsw.gov.au

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

If you are a security researcher, we request that you follow responsible disclosure best practices. Please avoid looking to compromise any actual user data.

Irresponsible use or disclosure of vulnerability information or confidential data may result in the appropriate sanctions under local and international law.

Testing Requirements:

Vulnerabilities should be verified as authentic, and not simply automated results of pen-tests. No repeated automated form submissions.

Possible Awards:

At this time, the Pagemind does not have any active reward program for reported vulnerabilities.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 20.09.2021 bursadabugun.com
 20.09.2021 dynatrace.com
 20.09.2021 veeam.com
 20.09.2021 alumni.tts.edu.sg
 20.09.2021 centris.ca
 20.09.2021 data.lunge.ai
 20.09.2021 legendww.me
 20.09.2021 worldtimeserver.com

  Latest Blog Posts

26.08.2021 by PyaePhyoThu98
eG Manager v7.1.2: Improper Access Control lead to Remote Code Execution (CVE-2020-8591)
14.07.2021 by Open Bug Bounty
Interview With Open Bug Bounty
25.05.2021 by 0xrocky
Google XSS Game
25.05.2021 by ShivanshMalik12
Testing for XSS (Cross Site Scripting)
25.05.2021 by darklotuskdb
Easy XSS On Mostly Educational Websites Via Moodle

  Recent Recommendations

@industryarena     16 September, 2021
    Twitter industryarena:
Thank you for detailed reporting of the XSS issue.
We were able to fix the problem with help of LuCkYtRaCeR.
@tophouse_ru     13 September, 2021
    Twitter tophouse_ru:
Thanks for your help!
@Gordi_OldGames     10 September, 2021
    Twitter Gordi_OldGames:
Thank you very much for reporting a vulnerability in our website!
@c2play     9 September, 2021
    Twitter c2play:
You seem to be an XSS hunter - thanks for the report and fast response! *FIXED* --Wachhund
@CERT_rlp     9 September, 2021
    Twitter CERT_rlp:
The team of CERT-rlp would like to thank YassDennis for a responsible and coordinated disclosure of XSS vulnerabilities